英语人>网络例句>二进制 相关的搜索结果
网络例句

二进制

与 二进制 相关的网络例句 [注:此内容来源于网络,仅供参考]

This property is shared by most binary operations, but not subtraction or division or octonion multiplication .

这个属性是共享的最二进制行动,而不是减法或科或octonion乘法。

One CIO defended IT's duty to "speak in the language of business", but finance executives retorted that IT tends to propose " faith-based initiatives" that overpromise on ROI and are poorly supported by metrics.

某个CIO声称IT的使命是&用商业的语言讲话&,但财务总监们反驳IT倾向于提出&信仰为基础的提议&,这些提议过度承诺了投资报酬率,并且&二进制&很难支持。

The greenish glow to the lower right of the Rho Ophiuchi cloud comes from dust surrounding and heated by the hot young binary star Sigma Scorpii.

该绿色辉光向右下方的rho ophiuchi云来自周围的尘埃和加热炎热年轻二进制明星西格玛scorpii 。

One of the problems with binary serialization is you can't look at the result.

使用二进制代码做序列化的问题之一就是你无法去查看结果。

The photoelectric detector changes the optical signal after receiving the electric signal, and then produces the binary code through A/D converter. The computer make the fuzzy deal according to the data; Finally, the computer sending out the orders of going forward or backwards shiftily, opening or closing the machine.

光电器件接收到光信号后转换成模拟电压信号,经A/D转换后产生二进制数字量,由微机读入后结合该值变化速率进行模糊处理,最后发出变速前进、变速后退及开机、关机命令,从而控制印刷品或制袋的运动及变速偏移,使彩色套印或分切制袋能准确正常地进行。

Reformed statement is to say that the safety of QQ, QQ online search by IP address (IP address is a 32-bit binary number, divided into four 8-bit byte, is the use of TCP / IP protocol used to identify the computer network and network equipment unique identifier) of the consideration torreya??

现在言归正转,说QQ的安全,在网上用QQ查IP地址(IP地址是一个32位二进制数,分为4个8位字节,是使用TCP/IP协议的网络中用于识别计算机和网络设备的唯一标识)的虑榧??

After the new binary form was created, we will attach the character 't' to the two compared terms and a '*' to the uncompared terms, but if the terms already attached with 't' character, it shoulddn't replaced with '*' if they can't be compared with the other terms.

在新的二进制形式的创建,我们会重视字符'吨'两个比较范围和'*'的uncompared条款,但'如果条件已附加吨的个性,它不应该为'取代*',如果他们不能相比的其他条款。

During some testing earlier a gem we were using required that the Ruby binaries on the server to be unstripped or not stripped.

在一些测试前比较,我们使用的宝石要求的红宝石二进制文件在服务器上是未被剥离或不被剥夺。

WABI? Windows Application Binary Interface?

&视窗&应用程序二进制接口

In binary synchronous communication, the use of clock pulses to control synchron ''.

二进制位同步通信中,使用时钟脉冲来控制数据和控制字符的同步。

第57/69页 首页 < ... 53 54 55 56 57 58 59 60 61 ... > 尾页
推荐网络例句

We have no common name for a mime of Sophron or Xenarchus and a Socratic Conversation; and we should still be without one even if the imitation in the two instances were in trimeters or elegiacs or some other kind of verse--though it is the way with people to tack on 'poet' to the name of a metre, and talk of elegiac-poets and epic-poets, thinking that they call them poets not by reason of the imitative nature of their work, but indiscriminately by reason of the metre they write in.

索夫农 、森那库斯和苏格拉底式的对话采用的模仿没有一个公共的名称;三音步诗、挽歌体或其他类型的诗的模仿也没有——人们把&诗人&这一名词和格律名称结合到一起,称之为挽歌体诗人或者史诗诗人,他们被称为诗人,似乎只是因为遵守格律写作,而非他们作品的模仿本质。

The relationship between communicative competence and grammar teaching should be that of the ends and the means.

交际能力和语法的关系应该是目标与途径的关系。

This is not paper type of business,it's people business,with such huge money involved.

这不是纸上谈兵式的交易,这是人与人的业务,而且涉及金额巨大。