非法碼 的英文怎麼說

中文拼音 [fēi]
非法碼 英文
unallowable code
  • : Ⅰ名詞1 (錯誤) mistake; wrong; errors 2 (指非洲) short for africa 3 (姓氏) a surname Ⅱ動詞1 ...
  • : Ⅰ名詞1 (由國家制定或認可的行為規則的總稱) law 2 (方法; 方式) way; method; mode; means 3 (標...
  • : Ⅰ名詞(表示數目的符號或用具) a sign or object indicating number; code Ⅱ量詞1 (指一件事或一類的...
  • 非法 : illegal; unlawful; illicit
  1. Tv announcement - don t use illegal tv decoder

    電視宣傳短片-勿用電視解
  2. Using fumy cipher, transmission data are kept secret that can prevent others from reading or writing data without permit. it can ensure data security

    為了確保數據傳輸的安全性,運用流密對數據進行加密傳輸,防止外來者的攻擊,未經授權進行數據讀寫操作。
  3. The catv charge and control system is mainly composed of the management software 、 the header data modulator and the terminal charge and control equipment. i am responsible for design catv charge and control equipment and test system. the header data modulator is used to encrypt the control single from computer and transmit it into the appointed frequency. the terminal charge and control equipment demodulate out the control single from data modulator and transmit it to the addressing control part, where the demodulated fsk single is received and well - handled by the cpu unit, decode the unauthorized signals and deliver it to the shut point, shut point make use of capability of wideband anf characteristic of shut, then the signal of illegal customer will be turn off and vice versa, the legal customer can receive the normal signal

    前端數據調制器完成對計算機輸出的控制信號加密處理,將指令載送到一指定頻率點。終端收費控制器解調出控制信號,送至單片機尋址控制部分。單片機尋址控制部分接收經fsk數據解調器送來的信號,送入cpu單元后,解出不授權信號,然後向關斷部分送入信號,關斷部分利用pin二極體的寬帶工作能力以及關斷特性,實現對授權用戶或者用戶的信號關斷,使之不能正常收視,繳費用戶進行開通正常收視,達到控制用戶通道的管理。
  4. Pay tv signal piracy still remains rampant despite efforts have been made by the law enforcers in trying to clamp down illegal decoders and by the industry in regularly using new technical solutions to combat piracy

    雖然執者已經不遺餘力遏制售賣收費電視解器,而業界亦不時使用新的技術程式以阻礙盜版活動的進行,但是收費電視信號的盜用情況仍然猖獗。
  5. Article 23 the acts that divulge the secret of commercial password techniques, unlawfully attack the commercial passwords or conduct the activities impairing the security and interest of the state with commercial passwords and constitute a crime in serious cases shall be legally investigated into the criminal responsibility

    第二十三條泄露商用密技術秘密、攻擊商用密或者利用商用密從事危害國家的安全和利益的活動,情節嚴重,構成犯罪的,依追究刑事責任。
  6. But in one corner of a drawer of his parent s bedroom, we managed to find a cheque stub written with berry export and a code

    支票存根寫上了berry export及有一個編。這一張小小的存根就是找出主犯財富的關鍵所在。
  7. Other types of errors could be generated by feeding bad input to an xbis encoder such as invalid characters in an element or attribute name, but checking for these would not involve any large overhead

    其他類型的錯誤可能是因為向xbis編程序提供不當的輸入造成的(如元素名或屬性名中的字元) ,但是檢查這類錯誤不需要多大的開銷。
  8. Among the arrested persons, 15 men and 48 women were arrested for breach of conditions of stay, 10 men for dealing in mobile phones, four men and 40 women for prostitution offences, eight men for gambling offences, 12 men for selling pornographic vcdsdvds, three men for selling pirated cd roms, and 10 men and 13 women for selling contraband cigarettes. a total of 14 300 pieces of pirated cd roms worth about $ 357, 000, 4 424 pieces of pornographic vcds and dvds worth about $ 91, 000 were seized. also, 40 720 pieces of contraband cigarettes worth about $ 61, 000 were found in the operation

    被捕者當中,十五男四十八女涉嫌違反逗留條件、十名男子涉嫌進行手提電話交易、四男四十女涉嫌與賣淫活動有關、八名男子涉嫌干犯賭博罪行、十二名男子涉嫌販賣色情影像光碟數光碟、三名男子涉嫌販賣翻版唯讀光碟,另外,十男十三女則涉嫌販賣未完稅香煙被捕。
  9. Tv operators are using the latest digitised technology to transmit signals and combat pirated viewing. these illegal decoders can t function properly

    收費電視公司已經採用最新的數科技來傳送節目,打擊盜看,器是用不上的。
  10. Once marked as a constrained region, code must only call other code with strong reliability contracts, and code should not allocate or make virtual calls to unprepared or unreliable methods unless the code is prepared to handle failures

    標記為受約束的區域后,代只能調用其他具有強可靠性約定的代,而且代不應分配或者對未準備好的或不可靠的方進行虛調用,除已經準備好處理錯誤。
  11. The connotation of guardianship for minors is caring for, assisting, educating, supervising and protecting minors. the guardianship also aims to satisfy minors ’ daily needs, guarantee their participation in social activities, supervise and protect the person and property of minors from unlawful infringement for the sound growth of minors

    以對未成年人照顧、扶助、教育、監督和保護為特定內涵的未成年人監護,通過對未成年人的行為能力給與積極的補救,旨在滿足他們在日常生活中最基本的需求,保證他們能夠參與起的社會生活,並監督和保護其人身、財產和其他合權益不受侵害,以保障未成年人的健康成長。
  12. Through testing on sequences from coding and non - coding part of escherichia coli, this algorithm excelled other algorithm in average error rate

    文中分別利用大腸桿菌編區和區的序列數據對演算進行了測試,結果表明,該方的平均錯誤率顯著低於其它方
  13. A security device ( often part of a terminal ) that reads information ( often from a magnetic strip ) on a badge inserted in a slot. in this way, it can prevent the unauthorized use of a display station before allowing an operator to sign on

    一種安全設備(通常是終端的一部分) ,它可以讀取插入槽中的標記卡上的信息(這些信息往往以磁條的形式記錄在標記卡上) 。用這種辦,在允許操作員進入系統前,可以防止對一個顯示工作站的使用。參閱badge 。
  14. The introduction of a w - prefix identity card for lawfully employable imported workers and foreign domestic helpers is yet another measure to help guard against the menace of illegal employment activities

    為了打擊僱用活動,我們以" w "字頭的身份證號,清楚區分合輸入的勞工和海外家庭傭工。
  15. In 2004, one american woman learned that her social security number had been used, mostly by illegal immigrants, for 38 different employers

    二00四年,一個美國女子得知她的社會保險號在三十八個不同僱主處遭到冒用,冒用者大多是移民。
  16. Allows the code in the assembly to perform illegal operations against the sql server process space and hence can potentially compromise the robustness and scalability of sql server

    如果指定unsafe ,將允許程序集中的代對sql server進程空間執行操作,因此可能會影響sql server的性能和可縮放性。
  17. We implemented and improved the license management system for the operation of telecommunications services, the network access of telecommunications equipment and the philatelic market, and harshly cracked down on the illegal activities such as the telephone number - associated fraud and unauthorized use of international dedicated lines to operate international telephone services in order to safeguard the state interests and the legitimate rights of the consumers

    我們根據市場的需要實行和完善了對經營電信業務、電信設備進網和集郵市場的許可證管理制度;配合有關部門嚴厲打擊盜用電信號和利用國際專線經營國際電話業務等違行為,維護國家利益和消費者合權益。
  18. Suddenly, software licensing code, copy protection mechanisms, and proprietary business logic are much more available for all to see - whether it s legal or not

    一時間,所有人都有了更多的機會可以看到軟體許可代、復制保護機制以及專有的業務邏輯,無論這樣做是合還是
  19. This is worrying because as far as we are aware the illegal decoders retailed in hong kong come from the prc

    據我們所知,在港零售的器是來自大陸的,這情況令人憂慮。
  20. In this paper, three human dna fragments were coinjected into mice in order to study the influence of uncoding large dna fragment on hsa or hfen1 gene ' s integration efficiency, to explore methods to produce high expression of human serum album animals, to find out how to establish multi - transgenic animals in a way of saving time and money, to provide experience and reference to others. it mainly contains the following aspects : firstly, according to the sequence of human serum album gene cdna in genebank, one primer was designed

    本實驗以小鼠為研究對象,採用兩種基因? hsacdna 、 hfen1和一種大片段dna進行共注射,旨在探索大片段dna對hsa和hfen1基因整合的影響及建立提高hsa基因整合效率的轉基因動物的方,同時,探索多基因轉基因動物建立的策略,以便尋求一種既節省時間,而又簡單經濟的轉基因方,為以後的研究提供一點的探索性經驗和參考。
分享友人