英语人>网络例句>computer program 相关的网络例句
computer program相关的网络例句

查询词典 computer program

与 computer program 相关的网络例句 [注:此内容来源于网络,仅供参考]

This course includes (1) Introduction to computer hardware,(2) Number system,(3) Boolean algebra,(4) Computer Architecture and program execution,(5) Microprocessor and assembly language.

课程内容包含:(1)计算机硬体介绍,(2)数字系统,(3)布林代数,组合逻辑,(4)计算机基本结构与程式之执行,(5)微处理机及组合语言。

In other words, when a branch in the code the computer was processing occurred (that is, there is an unanticipated call to another section of the program that necessitates another call to memory), instead of stalling the pipeline to retrieve the instructions that were branched to, the computer added a delaying instruction behind the branch that either did something useful while the other instructions were called, or at worst did nothing at all.

换句话说就是,当计算机执行的代码中出现了分支(就是说,发生了不可预料的对程序中其他程序段的调用,即必须实现一个新的访问存储器的操作)时,计算机不是停止这条流水线的工作去修复被分解的指令,而是在这个分支指令后增加一个延迟指令,该指令在其他指令被调用时,要么做一些有用的事情要么执行空操作。

Then the boundary element integral equation of interior and exterior form is deduced in detail, also the form with corner coefficient. The significance for numerical calculation and principle of the singular integral is analyzed, and a non-isoparametric transformation method is presented to calculate weak singular integral and Cauchy integral, the method presented provides us a very simple way to computer the two kinds of singular integral of Helmholtz boundary integral equation, and it is easy to program in computer. After the difficulty of the calculation for multi-frequency of Helmholtz boundary element is explained, a method named SECHIEF (Series Expansion Combined Helmholtz Integral Equation Formulation), which is focused on the computational efficiency, is presented.

对结构声辐射的边界积分方程的内部形式与外部形式进行了详细的推导,给出了角点系数的计算方法与边界积分方程的形式,在此基础上,分析了奇异积分产生的原理及其对数值计算的重要性,提出了一种计算奇异积分的非等参(来源:Ae8a8BC论文网www.abclunwen.com)单元的变换方法,该方法给Helmholtz 声学边界积分方程中的弱奇异积分与Cauchy 奇异积分的计算以及编程提供了极大便利。

This is the first computer language program written for a personal computer.

这是第一个计算机语言程序编写的一台个人电脑。

I studies in a computer training program,and can process data through the computer.

我在电脑培训班学习过,会用电脑处理8tTt8资料。

Include detinue, use, natural resources of system of filch computer information, system of information of filch, diddle, capturing computer controls right, do sth without authorization publishs other email address and material of other individual information to tripartite, date of filch other Zhang and password, or do sth without authorization publishs other Zhang date and code to tripartite, sham other name sends message, make intentionally, the ruinous program such as software of transmission ill will.

包括非法占有、使用、窃取计算机信息系统资源,窃取、骗取、夺取计算机信息系统控制权,擅自向第三方公开他人电子邮箱地址和其他个人信息资料,窃取他人账号和密码,或者擅自向第三方公开他人账号和密码,假冒他人名义发送信息,故意制作、传播恶意软件等破坏性程序等。

" Byelaw " proclaimed in writing prohibits detinue, use, natural resources of system of filch computer information, system of information of filch, diddle, capturing computer controls right, do sth without authorization publishs other email address and material of other individual information to tripartite, date of filch other Zhang and password, or do sth without authorization publishs other Zhang date and code to tripartite, sham other name sends message, make intentionally, the ruinous program such as software of transmission ill will.

条例》明文禁止非法占有、使用、窃取计算机信息系统资源,窃取、骗取、夺取计算机信息系统控制权,擅自向第三方公开他人电子邮箱地址和其他个人信息资料,窃取他人账号和密码,或者擅自向第三方公开他人账号和密码,假冒他人名义发送信息,故意制作、传播恶意软件等破坏性程序。

Byelaw is right a series of malfeasant undertake proclaimed in writing prohibits, include detinue, use, natural resources of system of filch computer information, system of information of filch, diddle, capturing computer controls right, do sth without authorization publishs other email address and material of other individual information to tripartite, date of filch other Zhang and password, or do sth without authorization publishs other Zhang date and code to tripartite, sham other name sends message, make intentionally, the ruinous program such as software of transmission ill will.

条例对一系列不法行为进行明文禁止,包括非法占有、使用、窃取计算机信息系统资源,窃取、骗取、夺取计算机信息系统控制权,擅自向第三方公开他人电子邮箱地址和其他个人信息资料,窃取他人账号和密码,或者擅自向第三方公开他人账号和密码,假冒他人名义发送信息,故意制作、传播恶意软件等破坏性程序等。

Endurer注:1.worry about 担心》 ZoneAlarm not only alerts you when someone tries to access your computer, but it alerts you when a program on your computer attempts unauthorized access to the Internet.

ZoneAlarm不仅在某人试图访问你的计算机时向你报警,而且当你的计算机中的程序未经验证地企图访问Internet时,它也会向你报警。

This program will then scan your computer for files that could be erased from your computer.

这一计划将扫描你的电脑档案,然后可以删除你的电脑。

第27/64页 首页 < ... 23 24 25 26 27 28 29 30 31 ... > 尾页
推荐网络例句

The reasons of iron ions content overproof in grade Ⅱ desalting water system,such as variation water quality,contamination of regenerant , operation adjustment of pretreatment system and switching operation of bed were discussed.

对二级脱盐水系统中铁离子含量超标的原因,如来水水质发生波动、再生剂受到污染、预处理系统操作调整、床体运行切换等进行了论述。

You were hired to drum up new business, so go and do it.

公司雇你招徕新业务,你就做你的事好了。

Who is in possession of this?

这是谁的?