执行程序
- 与 执行程序 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
A provision that claims resulting from rejection of an unexpired lease should be treated as on a parity with provable debts, but limited to an amount equal to three years rent, was held not to amount to a taking of property without due process of law, since it provided a new and more certain remedy for a limited amount, in lieu of an existing remedy inefficient and uncertain in result.
针对拒绝执行未到期租赁的索偿权应当与可证明债务享受同等对待,但金额限于三年的租金——由于这一条款提供了一种新的、更加确定的补偿方式,代替了现存的低效和不确定的补偿方式,这一条款要求不能未经法定诉讼程序取得财产。
-
The behavior of that function is system dependent, but it usually aborts the program.
这个标准库函数的行为依赖于系统,通常情况下,它的执行将导致程序非正常退出。
-
That is, when a program exits normally, the system arranges to execute the code in this section.
也就是说,当一个程序正常退出时,系统安排执行这个section的中的代码。
-
Organisations carrying out marketing research must have the appropriate internal procedures and controls in place, and are advised to establish ISO 9001 or equivalent Standards, to ensure that legislative and other requirements are not contravened.
市场研究的执行组织必须有适当的内部的程序和控制,建议建立 ISO 9001国际标准组织或相等的标准,保证不违背立法和其他的要求。
-
The condition that causes the processor to leave the RUN mode.The program counterpoints to the next instruction to be executed.
使处理机离开RUN方式的一种条件,此时程序计数器指向下一条要执行的指令。
-
It is acceptable for a firm to conduct part of the review by running a computer program, which culls out analytical data from each batch and conducts trend analysis to determine the need to change product specifications, manufacturing methods, or control part itself must be meaningful (i.e., specified and relevant to enable an evaluation to be performed).
这个程序是有重要意义的,可以每一批中精选出分析的数据,进行趋势分析来确定改变产品规格,生产方式或自身的控制部分的需要(例如,和一个评估被执行,被详细说明和有关的)。
-
Causes harm: Launches a denial of service attack at a target IP address, defaces Web servers, or plants Trojan horse programs for later execution.
损害原因:对一个目标IP地址实施一个拒绝服务攻击,损伤Web服务器,或者放上一个木马程序用来稍候执行。
-
Characteristics of blended threats include the following:· Causes harm: Launches a denial of service attack at a target IP address, defaces Web servers, or plants Trojan horse programs for later execution.
被混和的害虫的特征包含有如下几个方面:·损害原因:对一个目标IP地址实施一个拒绝服务攻击,损伤Web服务器,或者放上一个木马程序用来稍候执行。
-
Characteristics of blended threats include the following:· Causes harm: Launches a denial of service attack at a target IP address, defaces Web servers, or plants Trojan horse programs for later execution.
被混和 害虫特征包含如下几个方面:·损害原因:对个目标IP地址实施个拒绝服务攻击,损伤Web服务器,或者放上个木马程序用来稍候执行。
-
If there is no implementation found, no IL code is emitted in the compiled assembly.
如果没有执行发现,没有IL代码是在编译的程序集的排放量。
- 推荐网络例句
-
However, as the name(read-only memory)implies, CD disks cannot be written onorchanged in any way.
然而,正如其名字所指出的那样,CD盘不能写,也不能用任何方式改变其内容。
-
Galvanizes steel pallet is mainly export which suits standard packing of European Union, the North America. galvanizes steel pallet is suitable to heavy rack. Pallet surface can design plate type, corrugated and the gap form, satisfies the different requirements.
镀锌钢托盘多用于出口,替代木托盘,免薰蒸,符合欧盟、北美各国对出口货物包装材料的法令要求;喷涂钢托盘适用于重载上货架之用,托盘表面根据需要制作成平板状、波纹状及间隔形式,满足不同的使用要求。
-
A single payment file can be uploaded from an ERP system to effect all pan-China RMB payments and overseas payments in all currencies.
付款指令文件可从您的 ERP 系统上传到我们的电子银行系统来只是国内及对海外各种币种付款。