無代碼的 的英文怎麼說

中文拼音 [dàide]
無代碼的 英文
codeless
  • : 無Ⅰ動詞(沒有) not have; there is not; be without Ⅱ名詞1 (沒有) nothing; nil 2 (姓氏) a surn...
  • : Ⅰ動詞1 (代替) take the place of; be in place of 2 (代理) act on behalf of; acting Ⅱ名詞1 (歷...
  • : Ⅰ名詞(表示數目的符號或用具) a sign or object indicating number; code Ⅱ量詞1 (指一件事或一類的...
  • : 4次方是 The fourth power of 2 is direction
  1. Marks modules containing unverifiable code

    標記包含法驗證模塊。
  2. Modules containing unverifiable code should be marked with this attribute

    應使用此屬性標記包含法驗證模塊。
  3. The codewarrior instruction set simulator provides a quick and easy way to begin developing code without the requirement for access to hardware

    指令組模擬器提供開始開發快速簡便方式,需接入硬體。
  4. Design and construction tools can automate moving from high - level constructs to working code by providing wizards to automate design, construction, and test tasks by generating code and enabling usage of code snippets, and by converting integration and testing into seamless development tasks through integrated development, build, and test environments

    設計和構建工具可以通過提供自動化設計,構建,和測試任務向導來自動化從高級構件到工作轉移,而向導自動化功能是通過產生和允許片段使用,以及把集成和測試通過集成化開發,構建,和測試環境轉變為縫開發任務實現
  5. The software system of smart spaces distinguishs ifself from traditional distributed systems in that : 1 ) they should deliver functionality in our everyday world, which is a complex and dynamic changing environment ; 2 ) the system will consist of many wireless networked devices, while wireless connection is prone to transient failure ; 3 ) the interaction points for the people are distributed and multimodal, which imposes tight temporal constraints on the messaging between related modules ; 4 ) modules coming from diversified domains need to cooperate, which raise the need for an abstraction model at a proper level for the construction of the system

    智能空間系統具有區別于傳統分散式系統新特徵: 1 )背景環境是復雜、動態物理空間,新模塊可能隨時進入和離開; 2 )存在大量線聯網設備,而線網一個典型特徵是暫時性故障頻繁; 3 )系統交互點是分佈和多模態,相關模塊間消息時間關系要求嚴格; 4 )各種不同應用領域模塊都可能需要交互協作,同時需要考慮對遺留包容性。
  6. To help protect computer systems from malicious mobile code, to allow code from unknown origins to run with protection, and to help prevent trusted code from intentionally or accidentally compromising security, the. net framework provides a security mechanism called code access security

    為了幫助保護計算機系統免受惡意移動危害,讓來源不明安全運行,防止受信任有意或意地危害安全, . net framework提供了一種稱為「訪問安全性」安全機制。
  7. Structured exception handling also lets you easily provide cleanup statements that you can be sure will always execute no matter how control leaves a guarded section of code

    結構異常處理還讓你輕易提供清除聲明,這樣你可以確信:它將永遠執行論控制餘下一個防護區域。
  8. The data layer is also the center of the others, and the other layers finish their duties by operating the data objects in data layer. in the platform, both the microcosmic logic and the macroscopical logic are described by xml which separate the logic from the code. the separation improves the universal performance and the maintenance performance of the system

    在平臺中,充分使用了xml自描述性及擴展性優點,對平臺進行了合理分層,並在相應層中預留了數據介面,以適應二次開發特殊要求,這增強了平臺通用性,並且論是客戶端微觀邏輯,還是服務器端宏觀業務邏輯都使用xml進行描述,使得處理邏輯與程序分離,增加了通用性及整個系統可維護性。
  9. Since corba and java are platform independent, it is easy for us to do the work of code - transplanting

    由於corba 、 java等具有與平臺關性,使得很容易實現移植工作。
  10. For example, xml descriptions of molecules could be written for a drug encyclopedia application and then reused for a drug - design development tool by another party who has no access to the source code of the original application

    例如,可以為藥品大全應用程序編寫各種分子xml描述,然後可以(由權訪問原始應用程序另一方)將這些描述重用於藥品設計開發工具中。
  11. Anyone who checks in code which causes the trunk builds to fail will be the recipient of heaping helpings of trash talk and teasing until he gets it fixed

    任何人簽入引起構建失敗話,在他修復完之前就會被受到很多教導和揶揄。
  12. I consider templates and generic programming central to modern c + +. they are the keys to uncompromisingly efficient, type - safe code. however, they don ' t fit the classical object - oriented paradigm

    我認為模板和泛型編程是現c + +核心,是損效率、類型安全關鍵。然而它們並不適合經典面向對象編程思維模型。
  13. The netcelera web accelerator does not require any application rewriting, tagging, or other changes to application source code

    網上加速程序需任何應用重寫、標記,或其他對應用源更改。
  14. If you would like to start using html codes for paragraphs and line breaks, bold and italic, bullets or numbered lists, then look first at the coding used by your web designer

    如果你希望開始使用html來編輯段落、換行符、粗體字、斜體字、序列表和有序列表,先看一下網頁設計師們是怎麼樣使用這些
  15. Such code is protected against intentional or unintentional misuse by partially trusted mobile code without the developer or administrator having to do anything extra

    這樣不會受到部分受信任移動有意或濫用,須開發人員或管理員進行任何額外操作。
  16. First, the paper researches the format and semantic features of iso apt in detail, next, applies regular expression to describe the definition of apt ’ s tokens and uses context - free grammar to describe apt ’ s syntax rules, last, designs the intermediate code format which keeps on the source code semantic and designs a complete module to check lexical and syntax errors of nc code by using modern compiling techniques

    預處理技術方面,詳細研究了標準數控語言格式和語義並採用現編譯技術中正則表達式和上下文關文法分別描述了標準數控語言記號定義和語法結構定義;設計了保持源語義中間標準數控格式,在此基礎上,設計並構建了數控詞法和語法檢查模塊。
  17. In these models, the embedded component model based on intertask communication has the advantages such as support for real - time scheduling, demanding less underlying technologies support and consuming less resource. the embedded model based on assembly language source code is the technology reusing on source code, the embedded component model in the primary phase

    其中,基於任務間通信嵌入式組件模型是種新嵌入式組件模型;該模型資源消耗小、有實時調度能力、需大量底層支持;基於匯編源嵌入式組件實現模型也是一種處于探索階段組件實現模型,其直接對源進行封裝復用,是一種源組件復用技術。
  18. This thesis starts with the features and developing tendency of the recorder, and then discusses the realization of each functional parts of the little type paperless recorder, through a detailed introduction on its hardware and software structures, focusing mainly on the following innovative technologies : methods for banks switch, which makes the program running fluently on multi - roms

    論文首先簡要介紹了記錄儀發展歷史,以及各階段記錄儀性能比較,接著在介紹新型小長圖紙記錄儀系統軟硬體體系結構基礎上,對記錄儀各個功能部分實現進行了討論,其創新點主要有:單片機程序存儲器容量擴展實現,實現了多rom之間流暢切換。
  19. It helps protect computer systems from malicious code and helps protect trusted code from intentionally or accidentally compromising security

    它有助於保護計算機系統免受惡意攻擊,並保護受信任以使其安全性免受有意或危害。
  20. Tree for characters which could be used to hide code, and throws an exception if an identifier field contains an invalid character

    文本欄位中是否存在可用來隱藏字元,如果標識符欄位中包含效字元,則引發異常。
分享友人