执行程序
- 与 执行程序 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
In other words, when a branch in the code the computer was processing occurred (that is, there is an unanticipated call to another section of the program that necessitates another call to memory), instead of stalling the pipeline to retrieve the instructions that were branched to, the computer added a delaying instruction behind the branch that either did something useful while the other instructions were called, or at worst did nothing at all.
换句话说就是,当计算机执行的代码中出现了分支(就是说,发生了不可预料的对程序中其他程序段的调用,即必须实现一个新的访问存储器的操作)时,计算机不是停止这条流水线的工作去修复被分解的指令,而是在这个分支指令后增加一个延迟指令,该指令在其他指令被调用时,要么做一些有用的事情要么执行空操作。
-
According to using easy company network safe expert introduces: According to the frangibility of Web application process that OWASP organization released 2007 the statistical result of 10 big ranks makes clear, the flaw of the script that cross a station, infuse, request that cross a station is forged, information divulges the problem that waits for a respect to remain the hacker's at present popular attack way, and be atttacked with SQL infuse especially among them and cross station script attack to attach most importance to, the lawful sex that infuse of so called SQL is atttacked even if uses programmer to do not have pair of user data-in when writing code undertakes judging, bring about the person that inbreak to be able to command through insert and carrying out baleful SQL, obtain data to read the attributive; that take and revises and attack of the script that cross a station is join baleful code through be in the webpage, when the person that visit browses a webpage, the administrator of means prevail on that baleful code can be carried out or ceases through giving an administrator post a letter is browsed, win administrator limits of authority thereby, control whole website.
据动易公司网络安全专家介绍:根据2007年 OWASP 组织发布的 Web 应用程序脆弱性10大排名的统计结果表明,跨站脚本、注入漏洞、跨站请求伪造、信息泄露等方面的问题仍然是现在黑客流行的攻击方式,而其中尤以SQL注入攻击和跨站脚本攻击为重,所谓的SQL注入攻击就是利用程序员在编写代码时没有对用户输入数据的合法性进行判定,导致入侵者可以通过插入并执行恶意SQL命令,获得数据读取和修改的权限;而跨站脚本攻击则是通过在网页中加入恶意代码,当访问者浏览网页时,恶意代码会被执行或者通过给治理员发信息的方式诱使治理员浏览,从而获得治理员权限,控制整个网站。
-
Therefore,the existing system of rehabilitation—through-labour shall be consummated.By making the Law of Correcting Unlawful Action,the nature,the main body,the object,the method,the time limit of application,and the procudure of supervision of rehabilitation—through—labour can be explicite,so that it can be properly exercised.
因此,有必要改革完善现行的劳动教养制度,制定《违法行为教育矫治法》,明确劳动教养的性质、执行主体、执行对象、执行方式、适用期限、决定程序、监督程序等内容,以利于该制度的统一正确实施。
-
The hypothetic direction of research design is the process formulation of this project. Through participant observation of the executive process, results of the interview and survey sheet after project run down to refine the optimal collaborative- mode accord with requests of Taiwan's industry.
对於产学合作的程序规划作为执行此研究假设的方向,再经由专案的执行过程的参与发现,与最后对於企业主团队与学生的访谈调查结果,去修正出最后符合产业界所需的产学合作设计案程序规划。
-
X are under implementation, there is a need for hard drive cloning, please enter the Ghost subdirectory, run Ghost.exe procedures should be noted that, if it is in The program runs under DOS when running the program to start before the best mouse driver for DOS, because the operation of Ghost is like a window screen frame, use the mouse to click to choose will be more convenient - although it can be used to operate the keyboard.
Ghost就是克隆硬盘的程序,该程序在DOS下、Windows9.X下都可执行,所以要进行硬盘的克隆,请先进入到Ghost子目录,运行Ghost.exe程序,需要注意的是,如果是在DOS下运行该程序时,在运行该程序前最好启动DOS的鼠标驱动程序,因为Ghost的操作画面是仿窗口画面,使用鼠标点击来选择会方便一些--虽然也可以用键盘来操作。
-
From the view of history and comparison, the author finds that the functions and the value of the civil enforcement system are affected and can not be completely displayed as a result of many disadvantageous factors, such as the setting-up of the enforcement system that can not be carried out smoothly, the existence of the preceding procedure for notice before enforcement, the imperfect enforcement relief system, and the unreasonable enforcement regulations for prestation by act.
笔者从历史和比较的视点观察发现,在我国无法畅通运行的执行体制的设置,违背执行价值理论的执行通知前置程序的存在,极不完善的执行救济制度,不合理的行为给付的执行规定等众多不利因素影响着民事强制执行制度应有功能和价值的充分显示。
-
On this basis, the author holds that the preceding procedure for notice before enforcement can be cancelled, the confirmation procedure for the start of enforcement should be set up, the reasonable and running ways to realize the enforcement of the prestation by act should be regulated, and the contents for the enforcement relief should be regulated, and the contents for the enforcement relief system should be completed. As a result, the civil enforcement system of China can be improved continuously
在此基础上,笔者认为,可以取消执行通知前置程序,设立执行开始确认程序,规定合理的、可操作的行为给付的强制实现途径,充实执行救济制度的内容,从而不断完善我国的民事强制执行制度。
-
This program can be set to automatically process implementation, user-friendly process, in the time you need to be self-executing.
本程序可以设置程序为自动被执行,使用方便,使程序在您需要的时候被自动执行!
-
Recommendations: When you accidentally do not like to install the software, not smart aleck of the hard disk you can see the deletion of the software program, which may cause system "registry" error, thereby affecting the stability of the system, there are some software installation process of anti-Uninsatll not write well, can not be restored after deletion of the original features of the system, it would lead to "the procedure is invalid, close the program" or "reinstall" and other errors; there most of the procedures after the removal of 12 would leave the garbage DLL file, which not only caused by the mast system, but also indirectly affect the system's operating efficiency, the best way is twofold: First, the software is used to find the ask a friend first, and then installed it again; Second, the request of various expert advice online.
建议:当您不小心安装了不喜欢的软件之后,不要自作聪明的把硬盘中你所能看得到的软件程序删除,这可能会造成系统"登录"错误,进而影响系统的稳定性,也有某些软件的反安装程序Uninsatll写得并不好,删除后也不能恢复系统本来的面目,反而会出现"程序执行无效,请关闭程序"或"请重新安装"等错误;还有大部份的程序在删除后也都会留下一二个 DLL 的垃圾程序文件,这不仅造成系统的肥大,还会间接影响系统的运行效率,最好的方法有二:其一,是找用过这套软件的朋友先问一问,然后再去装它;其二,上网请求各路高手指点。
-
The service provider performs the following steps: receiving a request from a customer to establish communication with another customer; confirming the identity of each customer; transmitting to each customer executable code enabling encrypted communication therewith; obtaining from each customer information regarding the customer's computing environment; preparing a set of applications for use by each customer, in accordance with the customer information and the customer's request; transmitting the set of applications as executable code to each customer; establishing a communication path to each customer; and specifying the communication path to the customers, thereby permitting the customers to communicate over the path using those applications.
服务提供商执行以下步骤:接收从一个客户发出的与另一个客户建立通信的请求;确认各个客户的身份;向各个客户发送能实现加密通信的可执行代码;从各个客户处获得关于客户计算环境的信息;按照客户信息和客户请求,准备一组应用程序供各客户使用;把这组应用程序作为可执行代码发送给各客户;建立与各客户的通信通道;向客户说明通信通道,从而允许客户使用那些应用程序在该通道上进行通信。
- 推荐网络例句
-
However, as the name(read-only memory)implies, CD disks cannot be written onorchanged in any way.
然而,正如其名字所指出的那样,CD盘不能写,也不能用任何方式改变其内容。
-
Galvanizes steel pallet is mainly export which suits standard packing of European Union, the North America. galvanizes steel pallet is suitable to heavy rack. Pallet surface can design plate type, corrugated and the gap form, satisfies the different requirements.
镀锌钢托盘多用于出口,替代木托盘,免薰蒸,符合欧盟、北美各国对出口货物包装材料的法令要求;喷涂钢托盘适用于重载上货架之用,托盘表面根据需要制作成平板状、波纹状及间隔形式,满足不同的使用要求。
-
A single payment file can be uploaded from an ERP system to effect all pan-China RMB payments and overseas payments in all currencies.
付款指令文件可从您的 ERP 系统上传到我们的电子银行系统来只是国内及对海外各种币种付款。