保护模式
- 与 保护模式 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
Contributing to the confusion, the protected mode enhancements in Windows 2.0 and later were called 386 enhanced mode because they required 32 bit registers in addition to protected mode, and would not run on a 286 (even though 286es support protected mode).
Windows 2.0 和之后版本中的保护模式增强称为 386 增强模式,是因为他们除了保护模式外,还需要 32 位元的暂存器,并且无法在 286 上面执行(即使 286 支援保护模式)。
-
This book gave a detailed account of the concept and principles of protected mode, as well as the mechanisms to achieve with the assembly code, as well as some good examples of the protected mode of learning very helpful.
详细说明:此电子书详细讲解了保护模式的概念及原理,以及用汇编代码实现的机制,以及一些好的例子,对保护模式的学习很有帮助。
-
Since that time, I have learned much about protected mode and how the CPU handles it internally.
从那时以后,我学了很多关于保护模式和 CPU 内部如何实现保护模式的知识。
-
The purpose of protected mode is not to protect your program. The purpose is to protect everyone else from your program.
保护模式的目的不是保护你的程序,而是从你的程序的魔爪下保护其他的程序。。。。。。。
-
Therefore, using the BIOS in protected mode is nearly impossible.
在保护模式下使用实模式的地址值将导致保护异常的产生。
-
The first part initiates with the signification of the right of privacy, elucidates the definition of right of privacy and network privacy right, analyses the characteristics of network privacy right that distinguish it from conventional right of privacy; the second part details the current situation of personal privacy violation in the cyberspace and violation modes as well as types; the third part summarizes and compares the network privacy right protection modes and legislation frames of the typically USA and EU law systems;the fourth part depicts and analyses the situation of protection to network privacy right in China;in the last part a proposal on constituting national protection system for network privacy right is presented,i.e.,establish the primarily legal protection, accessorily vocational self-discipline and technology protection mechanism based evenly on interests of the state, users' rights of privacy and industrial revenues.
本文共分五个部分,第一部分从隐私权涵义入手,阐明了隐私权和网络隐私权的定义,分析了网络隐私权区别于传统隐私权的特征;第二部分阐述了目前网络空间中个人隐私权遭受侵害的现状及侵权方式及类型;第三部分对以美国和欧盟为代表的两大体系在网络隐私权保护模式与立法框架上做了总结和比较;第四部分阐述和分析了我国法律对网络隐私权保护的现状;最后在第五部分对构建我国网络隐私权法律保护体系提出了建议:即在兼顾国家利益、用户个人隐私利益和行业利益的基础上建立以法律保护为主,以行业自律和技术保护为辅的保护机制。
-
The paper analyses the meaning, feature, and the function of land trust protection from the trust basic principles.
1论文首先将我国现有的土地管理模式归纳为以耕地保护为核心的政策保护,并利用系统理论、委托代理理论和公共管理理论等从几个方面分析了这种模式的弊端和不足,指出了现有的以耕地保护为核心的政策保护模式需要社会化、多元化土地保护机制的有效配合。
-
For a long time it has been operated mainly under a passive protection --"the limited protection", which highlights protection and dispises using,thus hinderes the development of the life and production within the ruins, and limites the function of the site to play a greater role.
汉长安城遗址长期实行以&限制型保护&为中心的单一被动保护模式,这种重保护、轻利用的方式阻碍了遗址内居民生产、生活的发展,限制了遗址功能的发挥;另外随着城市建设速度和遗址外改革步伐的加快,对遗迹本体保护及遗址环境安全造成了一定的冲击,因此如何协调遗址保护与利用的关系、实现遗址可持续发展成为亟待解决的问题。
-
There are two kinds of information privacy protection mode-the property rights-based protected mode and moral rights-based protected mode. It can be concluded that both of the two models are not able to provide a complete and effective information privacy protection by combining the personality with interests of property. So, when we choose or establish an information privacy protection mode, there is no need to engage in a "quasi-religious disputes" to solve the personal information is a civil liberty or a property interest, it is a wise choice to open a new path, applying modified trade secrecy default rules to information privacy protection.
本文重点分析了两种信息隐私权保护模式,即以财产权为基础的保护模式和以道德权利为基础的保护模式,认为两种保护模式都不能将信息隐私中所蕴含的人格利益和财产利益有机的统一起来对信息隐私权提供完整有效的保护,我们在选择或者建立信息隐私权保护模式时,没有必要卷入一场&准宗教争议&去解决个人对其信息隐私所享有的权利或者利益究竟是一项公民自由还是一种财产利益,而更加明智的选择是另辟蹊径,将商业秘密不履行规则修正后适用于信息隐私权保护。
-
Beijing Electronic Science and Technology Institute, Beijing 100036,ChinaAbstract After considering actual needs for digital rights manager and security rask, a new watermark and cryptography based model for digital rights management is proposed, which includes seven objects, three of them are authenticity.
综合考虑数字版权保护的实际需求和安全隐患,结合水印技术和密码技术提出了一种新的数字版权保护模式,模式中共有7个实体,其中有3个权威机构。
- 推荐网络例句
-
Neither the killing of Mr Zarqawi nor any breakthrough on the political front will stop the insurgency and the fratricidal murders in their tracks.
在对危险的南部地区访问时,他斥责什叶派民兵领导人对中央集权的挑衅行为。
-
In fact,I've got him on the satellite mobile right now.
实际上 我们已接通卫星可视电话了
-
The enrich the peopling of Deng Xiaoping of century great person thought, it is the main component in system of theory of Deng Xiaoping economy, it is a when our country economy builds basic task important facet.
世纪伟人邓小平的富民思想,是邓小平经济理论体系中的重要组成部分,是我国经济建设根本任务的一个重要方面。