絕對代碼 的英文怎麼說

中文拼音 [juéduìdài]
絕對代碼 英文
a olute code
  • : Ⅰ動詞(斷絕) cut off; sever Ⅱ形容詞1 (完全沒有了; 窮盡; 凈盡) exhausted; used up; finished 2 ...
  • : Ⅰ動詞1 (回答) answer; reply 2 (對待; 對付) treat; cope with; counter 3 (朝; 向; 面對) be tr...
  • : Ⅰ動詞1 (代替) take the place of; be in place of 2 (代理) act on behalf of; acting Ⅱ名詞1 (歷...
  • : Ⅰ名詞(表示數目的符號或用具) a sign or object indicating number; code Ⅱ量詞1 (指一件事或一類的...
  • 絕對 : absolute
  1. Can we count on code signing to be foolproof

    我們能夠依靠簽名來保證安全嗎?
  2. To prepare a machine - language program from a symbolic language program by substituting absolute operation codes for symbolic operation codes and in absolute or relocatable addresses for symbolic addresses

    從符號語言程序產生一個機器語言程序,就是用操作換符號操作,用地址或浮動地址換符號地址。
  3. According to their connection mode, the first motion code is modified. furthermore, the other g codes of milling machine is studied in this paper, most of them have been appended into this system. including cannon cycle,

    此外,本課題中銑床其它nc也進行了研究,將大部分銑床nc添加到了系統中,主要包括固定循環指令、平面選擇、坐標系選擇、旋轉、縮放、鏡像、子程序調用等。
  4. On the other side, based on research on noncircular surface grinding features, this deissertation designs the data structure of simulation driver, then, applies interpolation theory to design the grinding motion simulation module and researches all sorts of cases on constructing the solid swept of grinding wheels in the process of noncircular surfaces grinding, finally, designs nc codes verification simulation module by using design model - based verification technique

    在實體模擬技術方面,詳細研究了非圓曲面磨削加工的特徵並設計了應的模擬驅動數據結構;應用插補原理設計了體現加工速度的運動過程模擬模塊;詳細研究了非圓曲面磨削加工中砂輪的相運動掃掠實體的構造,並採用基於精確實體設計模型的驗證方法構建了數控的模擬驗證模塊。
  5. The micron range for cppm150 series is from 1 to 150 micron, nominal rating. absolute ratings are also available under filter code cppa150

    Cppm150系列熔噴濾芯的過濾精度為1到150微米公稱精度。我們同時也備有精度的供客戶選擇,其產品為cppa150 。
  6. Conventional iec three ratio method and new iec ratio criterion are reduced according to the method of decision table in rough set theory respectively, simplified diagnosis rules are proposed. besides being identical with original iec method, the codes of conventional iec three ratio method are increased and bounds of new iec ratio criterion are augment by using this method, codes imperfectness of conventional iec three ratio method and code name absence of new iec ratio criterion are improved to some extent, scarcity of codes in conventional iec three ratio method is offseted, absolutization of sort and boundary in new iec ratio criterion is overcomed. this is important in practice for its flexibility and enhanced error tolerances

    應用粗糙集理論中的決策表化簡的方法分別常規iec三比值診斷表和iec新導則診斷表進行了化簡,得到了簡化的診斷規則,它們不但具有與常規iec三比值法和iec新導則完全相同的診斷分類能力,而且擴充了常規iec三比值表的編范圍和iec新導則的診斷范圍,在一定程度上改善了常規iec三比值表編缺損和iec新導則無號的問題,彌補了常規iec三比值法編的不足,克服了iec新導則分類及邊界的化,使得iec診斷法在實際診斷中更具靈活性、實用性和容錯性,提高了故障診斷能力。
  7. In the ntt docomo case, victims were forwarded a link to a web site where, once they arrived and clicked the right button, a scripting code launched a denial of service attack aimed at japan s emergency service number their equivalent to 911 in the u. s.

    在ntt docomo案例中,會給受害者轉發一個至網站的鏈接,一旦受害者訪問這個網站,並單擊鼠標右鍵,則腳本會發動針日本緊急服務號(相當於美國的911 )的拒服務攻擊。
  8. The rest mutations in pp38 and pp24 are at random. sequence analysis also shows the first 195 nuclear acids of pp38 and pp24 are the same except for the 81 site ( g / c ), but this mutation does not cause the change of amino acid. we regard this as a genetic marker connecting with geography in the evolution of mdv but not related to isolated time and pathotype of different strain of mdv i

    pp24基因和pp38基因進行同源性比較分析的結果表明,大多數毒株二者的前195個核苷酸完全一致,不同毒株間的第81位核苷酸的差異( g / c )並不引起編的氨基酸變化,僅僅與地域分佈有關,這很可能是mdv在長期病毒衍化過程中形成的地域性遺傳標志,而與病毒的分離年及mdv的致病型等因素無關。
  9. Needless to say, this approach is generally not a good error handling strategy for all but the most disposable code

    毋庸多言,該方法大多數可任意使用的來說通常不是一個好的錯誤處理策略。
  10. Fbg - based strain sensor has many virtues such as unerodibility, absolute code of wavelength, ability for anti - jamming, simple structure and easy execution, etc. so it can replace the traditional mechanical and electrical strain sensor in civil engineering, and has prosperous outlook in the application

    光纖光柵應變傳感器具有耐腐蝕、波長、抗干擾能力強、結構簡單、實施方便等特點,在土木工程方面可取傳統機械電子式應變傳感器,具有很好的應用前景。
  11. Polish it like a gem with good design, well - crafted user interfaces, sensibly integrated databases, and good performance where it counts, while at the same time striving for the maximum simplicity, abstraction, and production and reuse of reusable resources including code, components, applications, and designs

    她,你要愛若珍寶,時時擦拭,她會擁有精妙的設計、精雕細刻的用戶界面、良好感知的數據庫系統、佳的實用性能,並且同時具有最大程度的簡潔、精練、產品化,以及最大可能的包括、組件、程序和設計等可重用的資源的重用。
  12. Design view use absolute coordinate, but html document use normal flow style, the html code is very simple, designer handle the transform between design view and html view

    設計視圖採用坐標定位,而生成的html文檔採用流模式, html最簡潔,本程序內部進行兩種坐標模式的轉換。
  13. Attribute guarantees that an assembly associated with a code group marked with this attribute will never receive fewer permissions because of decisions made by a lower policy level administrator. for information on setting the

    屬性可以保證,與標有該屬性的組關聯的程序集不會因為較低策略級別管理員作出的決定而收到較少的權限。
  14. The code cowboy definitely does not play well with others

    牛仔沒辦法和別人一起工作。
  15. The following code example adds an item to the cache with an absolute expiration of one minute

    下面的示例將有一分鐘過期時間的項添加到緩存中:
  16. Exterior threats include the malicious code, denial of service, stealing and juggling data during transmission ; internal threats include privacy leakage, illegal access and modification. all these threats must be solved during the system construction

    外部威脅包括數據在傳輸中可能被竊取和篡改,惡意,和拒服務( dos ) ;內部威脅包括了系統的竊取和修改,員工有意和無意的訪問、修改一些他們沒有權限訪問的數據。
  17. For example, if an exchange administrator sets outlook to automatically deny all attempts to access address information using the outlook object model, then outlook will not allow the previous code example to access the

    例如,如果exchange管理員將outlook設置為自動拒所有試圖使用outlook象模型來訪問地址信息的操作,則即使前面的示例使用受信任的
  18. For asp. net server controls and server code, virtual paths using the web application root operator, the tilde, commonly are used instead of relative and absolute paths

    于asp . net服務器控制項和服務器,則通常使用那些採用web應用程序根操作符(即字號「 ~ 」 )的虛擬路徑而不是相路徑。
  19. Asp. net is configured so that any direct url request for the global. asax file is automatically rejected ; external users cannot download or view the code in it

    配置asp . net ,以便自動拒global . asax文件的任何直接的url請求;外部用戶不能下載或查看其中的
分享友人