操作數地址 的英文怎麼說

中文拼音 [cāozuòshǔdezhǐ]
操作數地址 英文
address operand
  • : Ⅰ動詞1 (抓在手裡; 拿; 掌握) hold; grasp 2 (做; 從事) act; do; operate 3 (用某種語言、方言說...
  • : 數副詞(屢次) frequently; repeatedly
  • : 名詞(建築物的位置; 地基) location; site; ground; foundation
  • 操作 : 1 (按照一定的程序和技術要求進行活動) operate; manipulate; handle 2 (所進行的若干連續生產活動的...
  1. To carry out a fetch, the processor place ( enables ) the binary - coded address of the desired location onto the address line of the external processor bus

    為了完成一個取,處理器將所需的單元的二進制編碼的放(使能)在外部處理器的線上。
  2. Specify that the subsequent array address operation performs no type check at run time, and that it returns a managed pointer with restricted mutability

    指定後面的在運行時不執行類型檢查,並且返回可變性受限的託管指針。
  3. The chip simulation network laboratory system this paper disguessed is a distribute network simulation system based on lan. the system ' s architecture is a c / s of three lays. the front platform are the chip simulation network system application program terminer ; the middle lay is a dcom server, it ' s duty is to deal with the communication and data transmission between the terminer and then database server, and to execute the logical operation. the application program just connect with the middle lay and get data from it, the connection and operation with database server will be managed by the dcom server. the duty of database server is to access and backup the final data

    具體是由位於網路各個終端的晶元模擬網路實驗系統應用程序為前臺;中間層為dcom應用程序服務器,負責處理前臺應用程序與后臺據庫的通信和據傳輸,並執行業務邏輯,前臺應用程序只需要與應用程序服務器建立連接,在中間層據即可,與后臺據庫的連接和由應用程序服務器來統一管理。后臺據庫只負責據的存取。本論文實施的晶元模擬網路實驗系統模擬了主要的邏輯電路器件, 8088cpu ,存儲器,寄存器,據總線,總線和控制總線,及其它相關晶元。
  4. Making logistics in reason rests with making transport in reason in most extent. in view of three ration require, that is, long distance transport between one producing area and one customer, ration between one logistics center and multiple customers, ration among multiple producing areas, multiple logistics centers and multiple customers, this paper carry out synthetic analysis and discuss according to theory related operational research such as dynamic programming, chart theory and network analysis, transport problem of liner programming. many factors influence the selection of regional logistics center allocation

    影響區域物流中心選的因素較多,論文根據模糊學理論,對多因素決策問題提出用貼近度的方法比較被選與理想目標的接近程度,用層次分析法確定各評價指標的權重,與隸屬函綜合成隸屬度,並用實例說明該方法的有效性。同其他方法相比較,綜合分析法可性更強。
  5. For the windows nt device driver of pioneer - net, pioneer - net card is a programmable i / o device, and the device driver uses buffer i / o mode to copy data between user address space and kernel address space

    在windowsnt系統下,本文認為先鋒網卡具有可編程i o設備的特點,並且採用緩沖i o的方式用於在用戶空間和內核空間之間的據拷貝。
  6. For the most part, the same physical machine gets the same ip address when multi - booted to different operating systems but sometimes i use dhcp, which assigns addresses above 192. 168. 1. 200

    大多情況下,同一物理機器在多重引導到不同系統時總是獲得相同ip(但有時我使用dhcp ,它分配192 . 168 . 1 . 200以上的) 。
  7. Effective operand address

    有效操作數地址
  8. The operand entry or subentry in machine instructions that specifies the number of bytes at a specific address that are affected by the execution of the instruction

    機器指令中的項或子項,定義由於執行指令而受影響的特定的位元組
  9. The common type system also provides three byte - based address arithmetic operations on pointer types : adding integers to and subtracting integers from pointers, and subtracting one pointer from another

    通用類型系統還對指針類型提供了三種基於位元組的演算法:向指針加上整,從指針減去整,以及從一個指針減去另一個指針。
  10. Specifies that the subsequent array address operation performs no type check at run time, and that it returns a managed pointer whose mutability is restricted

    指定後面的在運行時不執行類型檢查,並且返回可變性受限的託管指針。
  11. Because authentication is apart from data transpoart later and the authentication has no time stamp or nonce, when received information the bluetooth device does n ' t tell from the information is new or out of date. so authentication is easy attacked by so called middle man. we may solve this by introduce time idea at authentication. one is operate the bluetooth device address and bluetooth clock and take the value as bluetooth device, the other is start a timer at authentication

    由於鑒權過程和後面的據傳輸是分開的,同時鑒權過程又沒有時間戳或現時,藍牙設備收到信息后不能辨別所收到的信息是新的信息還是過時的信息,所以鑒權過程易受「中間人」攻擊。可以在鑒權過程中引入時間概念,一是將藍牙時鐘與藍牙設備進行某些后的值為鑒權時的藍牙設備輸入;二是在鑒權開始時啟動定時器。
  12. Pae is an intel - provided memory address extension that enables processors to expand the number of bits that can be used to address physical memory from 32 bits to 36 bits through support in the host operating system for applications using the address windowing extensions api

    ( pae是intel提供的內存擴展機制,它通過在宿主系統中使用address windowing extensions api為應用程序提供支持,從而讓處理器將可以用來尋物理內存的位從32位擴展為36位。 )
  13. The unary operator returns the address of its operand requires

    一元&運算符返回(要求
  14. This extended area can only be used as a cache, and the data has to be moved back into the address space to be manipulated

    這個擴展的區域只能用緩存,要縱其中的據,必須將據移回空間。
  15. That would not guarantee security against a search for the presence or absence of a particular name and address

    據庫無法保障有關搜索某個名字或存在與否之的安全性。
  16. Gprs are the source and destination of all integer operations and are the source for address operands for all load store operations

    Gpr是所有整的源和目的,也是所有加載/存儲的源。
  17. Address, operand effective

    有效
分享友人