英语人>网络例句>二进制 相关的搜索结果
网络例句

二进制

与 二进制 相关的网络例句 [注:此内容来源于网络,仅供参考]

As a general rule, no more that 15 consecutive zeros can be transmitted without violating the ones density rule. B8ZS (Binary 8 with Zero Substitution), the newer line coding technique used in T-1 circuits, substitutes alternating bipolar pulses for the eighth zero in a string of eight consecutive zeros. B8ZS also supports clear channel communications of 64 Kbps per channel.

作为一种通用规则,不存在连续15个以上0序列被发送而又没有违反信号密度规则。T-1电路中使用的最新的线路编码技术B8ZS(二进制八0替换法)在信号传输中出现连续8个0时,将使用交替双极脉冲替换这8个0.B8ZS也支持64kbps信道的纯信道传输。

Wipe repeadetly overwrites special patterns to the files to be destroyed, using the fsync call and/or the O_SYNC bit to force disk access.

一遍遍地擦掉特殊的格式并重写到文件上,这种方法将被毁掉,用fsync称呼和 O_SYNC二进制来强制磁盘访问。

But in case of .Net, the compiler will not generate binary code from the ASCII code, instead the compliers will generate only the MSIL (MicroSoft Intermediate Language) from the ASCII code.

但在案件。净,编译器将不会生成的ASCII码的二进制代码,而是将产生的执行者只能从ASCII码的MSIL。

Provides simple file buffering for Delph - It works only w/ binary files and treats that file as a stream of bytes

它使用文件作为缓存区,只支持二进制文件,并将文件看作一个字节流。

Remember the discussion in chapter 4 about binary file deltas?

还记得我们在第四章讨论过的二进制文件增量吗?

A tool which uses binary deltas in the repository may be a better choice.

一个工具在配置库中使用了二进制增量可能是一个更好的选择。

Subversion and Vault are examples of tools which use binary file deltas for repository storage.

Subversion 和 Vault 是使用了二进制文件增量的存储库的工具实例。

Every character in storage is represented by a string of 0s and 1s-the only digitals found in the binary numbering system.

存储器中的每个字符都用0、1(二进制编码系统中仅有的数字)数串表示。

Xenon compounds Xenon forms some binary fluorides and oxides, as well as fluoride complexes and oxoanions.

氙气化合物形式某些二进制氟化物和氧化物,以及氟化合物和oxoanions 。

To overcome the shortcoming of the double-way authentication access control scheme based on Harns digital signature, a new double-way authentication protocol is proposed to improve the old one. A new single-key-lock-pair access control scheme is proposed as a improved access control scheme, based on the property that a integer can be denoted into only one binary digital.

针对基于Harn数字签名双向认证访问控制实现方案中所存在的问题,运用密码技术改进了原方案的双向认证协议,并作为对原访问控制方案的改进,基于整数二进制表示的唯一性,提出了一种新的单钥-锁对访问控制方案。

第63/69页 首页 < ... 59 60 61 62 63 64 65 66 67 ... > 尾页
推荐网络例句

We have no common name for a mime of Sophron or Xenarchus and a Socratic Conversation; and we should still be without one even if the imitation in the two instances were in trimeters or elegiacs or some other kind of verse--though it is the way with people to tack on 'poet' to the name of a metre, and talk of elegiac-poets and epic-poets, thinking that they call them poets not by reason of the imitative nature of their work, but indiscriminately by reason of the metre they write in.

索夫农 、森那库斯和苏格拉底式的对话采用的模仿没有一个公共的名称;三音步诗、挽歌体或其他类型的诗的模仿也没有——人们把&诗人&这一名词和格律名称结合到一起,称之为挽歌体诗人或者史诗诗人,他们被称为诗人,似乎只是因为遵守格律写作,而非他们作品的模仿本质。

The relationship between communicative competence and grammar teaching should be that of the ends and the means.

交际能力和语法的关系应该是目标与途径的关系。

This is not paper type of business,it's people business,with such huge money involved.

这不是纸上谈兵式的交易,这是人与人的业务,而且涉及金额巨大。