GbEng
沿着屏幕的底部排列所有最小化的应用程序。 Arrange the icon of all minimize application across the bottom of the screen.
这一程序有哪些功能? What functions can this program perform?
计算机程序设计人员的一般工资是多少? What's the going rate of computer programmers?
用来分隔或组织计算机程序元素或数据元素的字符或字符串。例如括号、空格符、算术运算符、if(如果)、“BEGIN"等。 A string of one or more characters used to separate or organize elements of computer programs or data; for example, parentheses, blank character, arithmetic operator, if,"BEGIN".
初始设计开发阶段,首先必须发现可能存在的错误,并作相应的设计修改。正是在这个时期中,设计辅助程序、仿真技术和设计支援技术对于快速设计都是必不可少的。 The initial design development stage wherein, at first, it is certain that errors will be discovered which will require design changes. It is in this period that design aids, emulation techniques, and supportive design techniques are essential to quick design.
要正式提出投诉是有固定程序的. There is a set procedure for making formal complaints.
你很快就会对这些程序完全熟悉了. You will soon become fully acquainted with the procedures.
公式计算语言的简称,应用不太广泛的一种高级程序设计语言。 An abbreviation for formula calculation language, a high-level programming language not too widely used.
在计算机程序设计中,一种高级语言的语句或指令,其功能是将一个值放到程序指定的内存地址单元内。 In computer programming, a high level language instruction that places a value in a program specified memory address, location.
对程序进行修改是徒劳无功的. Revising the procedure was an entirely profitless exercise.
这样的程序是从旧制度那里沿袭下来的. This procedure is a hangover from the old system.
委员会的事务因程序上有困难而耽搁了. The business of the committee was delayed by procedural difficulties.
汇编程序设计中,用项和括号对的组合所代表的一个或多个操作。 In assembler programming, one or more operation represented by a combination of terms and paired parentheses.
计算机病毒一种自身复制并干涉软件功能或破坏储存信息的程序 A program that replicates itself and interferes with software function or destroys stored information.
警方的程序规章定立後, 遗留下许多难以处理的灰色区域. When the rules for police procedure were laid down, a lot of grey areas remained.
一种正在执行中的程序,是一种活着的实体,能引起事件的发生;而程序是被动的,处于静止状态。 A program in execution, a process is an active entity, which can cause things to occur, as opposed to a program, which is a passive entity.
这套程序是经理人员制订计划的可贵的工具。 This program gives managers a valuable planning tool.
在系统中等待处理的一组或一队列新信息,主调度程序对该队列及其它队列进行扫描,使之顺序进入处理状态。 A queue of new messages(or a group) within a system that are awaiting processing. The main scheduling routine will scan them along with other queues and order them into processing in order.
指实现后台处理。所谓后台处理是指非联机处理,或者说不是直接和计算机连接起来而进行联机操作。优先级高的程序先于特定的后台作业执行。 Performing background processing which is not on-line or directly connected to the computer for on-line operation. High priority programs take precedence over specific background jobs.
软件保护中,把不能复制的标记或签名存放在软盘上的方法,用一个特殊测试程序来检测签名是否存在,如不存在,则被保护的程序不能运行。 In software protection, a method of giving a mark, or signature, that cannot be duplicated, to a floppy disk. A special test routine detects if a signature is present, and if it is not found the protected program will be disabled.
对计算机程序中的指令序列的检测和记录,例如在监控程序和调试程序中使用的情况。 The detection and recording of the sequencing of instructions in computer programs, for example, as used in monitors and debugging routines.
验证协议的程序,它从一个给定的初始状态机械地产生出一切可以到达的状态,并且审查每一状态下用户定义的条件的有效性。 A program for protocol verification which mechanically generates all states reachable from a given initial state and checks the validity of user defined conditions in each state.
计算机的反馈能使我们更新程序. The feedback from the computer enables us to update the program.
诉讼记录法律案件中法庭诉讼程序的简要记录 A brief entry of the court proceedings in a legal case.
热冶,火法冶金一种冶炼矿石的程序,如熔炼,它依靠热的作用 An ore-refining process, such as smelting, dependent on the action of heat.
当数据从一个设备传送到另一个设备时,用于补偿数据流速率差或事件发生时间差的一种例行程序或存储器。 A routine or storage used to compensate for a difference in rate of flow of data, or time of occurrence of events, when transferring data from one device to another.
在数据保密学中,通过合法访问数据的进程将数据传输给未授权的用户的过程。例如,编译程序在编译期间便可能泄漏专用程序。 In data security, the transmission of data to unauthorized users by processes with legitimate access to data. A compiler, for example, could leak a proprietary program whilst it is being compiled.
"请给电脑编制一个程序,以便进行这项工作代替手工操作。" Please program the computer to do the job instead of manual operation.
下次再到一个需要使Shockwave的网站时,Shockwave控制程序就会自动装载并播放电影。 The next time you go to a"Shocked" website, the Shockwave control loads and plays the movie.
联编实用程序的简称,是一种能够实现联接和编辑的操作系统级的程序。参阅link-editor。 Short for binder utility, an operating-system program that performs binding.
在计算机程序设计中,将主存某些单元的内容复制到同一主存中的其它单元中去。同transfer。 In computer programming, to copy from locations in main storage into locations in the same main storage.
贴花转印法把印在(尤指)准备好的纸张上的图画或图案转印到玻璃或金属等材料上的程序 The process of transferring pictures or designs printed on specially prepared paper to materials such as glass or metal.
换码,转义,退出,逸出,中断执行尤指用来中断一条指令、停止程序运行或者在同一个程序中改变层次 A key used especially to interrupt a command, exit a program, or change levels within a program.
产生某种指定类型和格式的结果的程序或另一种编码序列(如“宏生成程序”、“微代码生成程序”)。 A program or other coding sequence that produces a result of specified type and format("a macro generator";"a microcode generator").
其功能可以利用程序建立或改变的,有时也称智能的(例如“一个可编程终端”,“一个可编程的机床”)。 Also, sometimes, intelligent. With a function that can be established or changed by means of a program;("a programmable terminal";"a programmable machine tool").
民事的,民法的关于个人隐私权及相关于这些权利的法律诉讼程序的,区别于刑事的、军事的或国际的条例或诉讼程序 Relating to the rights of private individuals and legal proceedings concerning these rights as distinguished from criminal, military, or international regulations or proceedings.
在计算机程序运行过程中发生的一种不希望有的或意料之外的停机,一般是由于编码失误、硬件故障或操作者的错误而引起的。参阅run。 In computing, an unwanted or unforeseen halt in a program run, due to faulty coding, hardware errors or operator mistakes.
计算机程序、例程、或子例程内的具有如下功能的任何指令,执行这条指令后控制权将不再由该计算机程序、例程、或子例程行使了。 Any instruction in a computer program, in a routine, or in a subroutine after the execution of which control is no longer exercised by that computer program, that routine, or that subroutine.
在计算机安全学中,一种计算机程序,表面上或实际上有某种有用的功能,而含有附加的(隐藏的)可能利用了调用进程的合法特许来危害系统安全的功能。 In computer security, a computer program with an apparently or actually useful function that contains additional(hidden) functions that surreptitiously exploit the legitimate authorizations of the invoking process to the detriment of security.