二进制的
- 与 二进制的 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
In the paper we generalize the while-rule in Hoare calculus to an infinite one and then present a sufficient condition much weaker than the expressiveness for Cook'2 relative completeness theorem with respect to our new axiomatic system.
程序推理使用的抽象机器与物理机器的差距降低了推理的精确度,为了缩小这个差距,本文提出了一个带位级别抽象的新抽象机,在这个机器里,二进制整数以纯语法的方式被表示成位矢量而不是非负整数。
-
The first generation of computer was characterized by the most prominent feature of the ENIAC-vacuum tubes.Through 1950,several other notable computers were built,each contributing significant advancement,such as binary arithmetic,random access,and the concept of stored programs.These computer concepts are common in today's computers.
第一代计算机ENIAC以真空管为显著标志,到1950年又制造出了另外几台著名的计算机,而且每一台都取得了很大的进展,如像二进制运算、随机存取和存储程序的概念,这些概念在当今的计算机中仍是普遍使用的。
-
However, unlike a compiled language the executable binary file is stored in pseudo-code, not machine language.
然而,和编译型语言不同的是,这种可执行的二进制文件是以伪代码的形式而不是机器语言的形式存储的。
-
This article deals with the calculating rules, several handling situations of quotient and remainder in "Binary fixed point mending code division by one figure" based on the teaching material THE THEORY OF COMPUTER COMPOSITION .
针对《计算机组成原理》教材中关于"二进制定点补码一位除法"中的运算规则、商及余数的几种情况,进行了深入、详实的研究与讨论,补充了教材中的缺憾,论证了计算机在除法操作中的基本原理。
-
The realization of the electronic signature of this system makes use of users' authority to sign, as one user has approved the report forms selected, he only just needs to push " signature "s according to the knob, The binary scale picture that he stored in the data base will be "ed sign" to the corresponding position of the report form automatically.
本系统的电子签名的实现就是利用用户的权限来签名的,当某一用户认同了所选报表,他只需按下"签名"按钮就行了,他储存在数据库中的二进制图片就会自动地"签"到报表的相应位置。
-
Normally blank characters - like the binary NUL and ASCII 255 - are visible, and the space character can be shown as a grid to assist programmers and screen designers with code layout and design.
通常空白的人物-像二进制任何人及A SCII的2 55-可见,和空间的性质可以证明作为一个网格,以协助程序设计师和屏幕设计师与代码的布局和设计。
-
Reformed statement is to say that the safety of QQ, QQ online search by IP address (IP address is a 32-bit binary number, divided into four 8-bit byte, is the use of TCP / IP protocol used to identify the computer network and network equipment unique identifier) of the consideration torreya??
现在言归正转,说QQ的安全,在网上用QQ查IP地址(IP地址是一个32位二进制数,分为4个8位字节,是使用TCP/IP协议的网络中用于识别计算机和网络设备的唯一标识)的虑榧??
-
But in case of .Net, the compiler will not generate binary code from the ASCII code, instead the compliers will generate only the MSIL (MicroSoft Intermediate Language) from the ASCII code.
但在案件。净,编译器将不会生成的ASCII码的二进制代码,而是将产生的执行者只能从ASCII码的MSIL。
-
Fuzzy logic can deal with values between 0 and 1 is more analogous to human logic than the traditional binary logic of digital computers.
模糊逻辑可处理0与1间的数值;与传统的数字电脑的二进制逻辑比较,它更似人脑的逻辑推理。
-
You have to of course, load your binary file image into the correct offset for it to run properly since all its relocations have been statically linked already.
当然,要能让它正确的运行,您必须把您的二进制文件装载到正确的偏移量,因为所有的重定位信息都已经被静态地连接好了。
- 推荐网络例句
-
We have no common name for a mime of Sophron or Xenarchus and a Socratic Conversation; and we should still be without one even if the imitation in the two instances were in trimeters or elegiacs or some other kind of verse--though it is the way with people to tack on 'poet' to the name of a metre, and talk of elegiac-poets and epic-poets, thinking that they call them poets not by reason of the imitative nature of their work, but indiscriminately by reason of the metre they write in.
索夫农 、森那库斯和苏格拉底式的对话采用的模仿没有一个公共的名称;三音步诗、挽歌体或其他类型的诗的模仿也没有——人们把&诗人&这一名词和格律名称结合到一起,称之为挽歌体诗人或者史诗诗人,他们被称为诗人,似乎只是因为遵守格律写作,而非他们作品的模仿本质。
-
The relationship between communicative competence and grammar teaching should be that of the ends and the means.
交际能力和语法的关系应该是目标与途径的关系。
-
This is not paper type of business,it's people business,with such huge money involved.
这不是纸上谈兵式的交易,这是人与人的业务,而且涉及金额巨大。