二进制文件
- 与 二进制文件 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
The binary blob of data is different, depending on what the particular Index.dat file is used for.
二进制的blob的数据是不同的,这取决于特定的Index.dat文件用于。
-
It is ok if there is no way to produce a binary or executable form for a certain program (since some languages don't support that feature), but you must have the freedom to redistribute such forms should you find or develop a way to make them.
如果某一特定的程序无法生成二进制或是可执行的形式(因为一些语言不支持那种形式),那也可以。但你必须拥有重新发布这种形式文件的自由,你应该寻找或者开发一种制作它们的方式。
-
For production, it is very easy to switch to the Binary Formatter, which produces much smaller files.
对于生产,很容易切换到二进制格式,产生更小的文件。
-
The theory and application is explained in this paper. Software XMGREDIT5 matching ELCIRC is used to generate unstructured grid, and is considered fit for ocean but rivers. Tidal current is simulated and validated well, and sensitivity of current structure to bathymetry is visible. Affection of wind is qualitatively analyzed here. At the same time the model is improved on as required, like the tidal open boundary which could choose not only long period harmonic constant but also short period harmonic constant and tidal level, and multi-point results and flow field data could be exported effectively with binary results.
本文介绍了ELCIRC的理论及使用;基于其在Linux平台下的软件XMGREDIT5生成全三角形网格并评价其特性,认为XMGREDIT5较适合大范围海域而不适用于河道;应用ELCIRC模型计算了长江口的潮流场并进行验证,结果与实测资料吻合良好,且能较好地模拟出地形变化对水流结构的影响;文中对于风场的影响作了定性分析,同时根据实际需要对模型作了改进,如将仅支持长期资料调和常数的开边界条件改为可选择的短期调和常数边界和潮位边界,使二进制格式结果文件数据输出可以处理多点数据及流场等等。
-
The item is then stored in a bin corresponding to its hash code.
项目是然后贮藏在二进制目标文件-操作系统扩展名:相应的到它无用信息代码。
-
A method to code character image based on information of run length is presented, which can save a mass of file spaces with binary form to access data.
提出用行程段信息表示字符图像的编码方法,以二进制形式存取,能节省大量的文件存储空间。
-
I mentioned earlier that a metafile is a collection of GDI function calls encoded in binary form.
我早先提到元文件是以二进制形式编码的 GDI 函数调用的集合。
-
The procedure will internally be very different depending on how the table is stored (sequential array or file, hash table, binary or B-Tree etc.).
对于不同的表储存结构(顺序数组或文件,哈希表,二进制或B树等等。),程序在内部是不同的。
-
The program overwrites all bits in selected files, including cluster slack space, with binary 1's, 0's, and/or random bit patterns.
该计划覆盖所有钻头在选定的文件,包括集束的闲置空间,与1的二进制的,零的,和/或随机的位模式。
-
Wipe repeadetly overwrites special patterns to the files to be destroyed, using the fsync call and/or the O_SYNC bit to force disk access.
一遍遍地擦掉特殊的格式并重写到文件上,这种方法将被毁掉,用fsync称呼和 O_SYNC二进制来强制磁盘访问。
- 推荐网络例句
-
We have no common name for a mime of Sophron or Xenarchus and a Socratic Conversation; and we should still be without one even if the imitation in the two instances were in trimeters or elegiacs or some other kind of verse--though it is the way with people to tack on 'poet' to the name of a metre, and talk of elegiac-poets and epic-poets, thinking that they call them poets not by reason of the imitative nature of their work, but indiscriminately by reason of the metre they write in.
索夫农 、森那库斯和苏格拉底式的对话采用的模仿没有一个公共的名称;三音步诗、挽歌体或其他类型的诗的模仿也没有——人们把&诗人&这一名词和格律名称结合到一起,称之为挽歌体诗人或者史诗诗人,他们被称为诗人,似乎只是因为遵守格律写作,而非他们作品的模仿本质。
-
The relationship between communicative competence and grammar teaching should be that of the ends and the means.
交际能力和语法的关系应该是目标与途径的关系。
-
This is not paper type of business,it's people business,with such huge money involved.
这不是纸上谈兵式的交易,这是人与人的业务,而且涉及金额巨大。