代码
- 与 代码 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
Removal of the most obviously redundant line of code of all, the mov eax, eax, was an example of dead code removal, which is basic to any optimiser.
一个优化器需要实现的基本功能:删除代码中所有的明显的冗余,mov eax, eax 是一行典型的无效代码。
-
Obfuscated code or scripts are designed to be hidden within the normal code for your site, so they can be hard to detect.
伪装代码或脚本的目的是隐藏在正常的代码为您的网站,以便他们能够就很难发现。
-
Checksumming code is obfuscated, hard to find, and the use of checksum results is also hidden.
校验和代码常与其他代码混淆,难于发现,其结果的效用也是隐藏的。
-
The same problem would occur with operating system code, a program that overwrote part of the operating system code would crash the operating system.
同样的问题也会发生在操作系统的代码中:一个程序覆写操作系统的代码将垮掉操作系统。
-
Encapsulation technique saved time for programmer and reduced the difficulty of programming. Code reuse avoids the repetition of programming and predigests maintenance of code. Component technique makes it conveniently to take advantage of the 3rd party components.
封装技术节省了开发人员理解底层代码的时间,降低了开发的难度;代码重用避免了重复编程,简化了维护的工作;组件技术使得程序员可以方便的利用第三方控件。
-
There is a wide variety of representations possible and one can express a given Turing machine program as a sequence of machine tables, as flowcharts, or as a form of rudimentary machine code or assembly code called "sets of quadruples".
有各种各样的表述可能和一个可以表达某一图灵机程序作为一个序列机桌,流程图,或作为一种最基本的机器代码或汇编代码所谓的套四倍。
-
Diversity can be created in a number of ways, such as by adding nonfunctional code, reordering code or randomizing memory locations, file names or system calls.
多样性可有多种方法生成,如加入不起作用的代码、重新排序的代码或者存储位置、文件名或系统调用的随机化等。
-
A virus is code written with the express intention that the virus code replicates itself.
病毒是编写的代码,其明确目的就是病毒代码复制其本身。
-
As the code is built the constant rerunning of existing tests prove that any new enhancements do not break existing code.
由于代码是建立在现有的测试不断重新运行证明,任何新的增强功能不会破坏现有的代码。
-
According to the way that spited code of web modify and destroy operating system ,it provides means to prevent spited code of web and recover after aggression .
,作者提出了预先防范网页恶意代码和被网页恶意代码侵入后恢复系统正常运行的方法
- 推荐网络例句
-
Do you know, i need you to come back
你知道吗,我需要你回来
-
Yang yinshu、Wang xiangsheng、Li decang,The first discovery of haemaphysalis conicinna.
1〕 杨银书,王祥生,李德昌。安徽省首次发现嗜群血蜱。
-
Chapter Three: Type classification of DE structure in Sino-Tibetan languages.
第三章汉藏语&的&字结构的类型划分。