在退出编辑器时,命令读取临时文件并修改二进制配额文件以反映修改。
When the editor is exited, the command reads the temporary file and modifies the binary quota files to reflect any changes.
在修改二进制文件之前,必须从Subversion中移出二进制文件,然后将它转换成原有的格式。
You would have to remove the binary from Subversion and revert it to its original form before altering it.
当您用完修改的源代码项目时,删除它恢复到原始的二进制版本。
When you are finished using the modified source project, simply delete it to revert back to the original binary version.
这是一个二进制文件,只能使用db2audit命令行语法对它进行修改。
This is a binary file that should only be modified using the db2audit command line syntax.
这些都是二进制文件,只能用CATALOG和UNCATALOG命令修改。
These are binary files and can only be modified with the CATALOG and UNCATALOG commands.
我们此处讨论的方法是要启用GDB在一个二进制文件中支持对多个目标程序的支持,并修改PowerPC目标程序,使其知晓spufs的存在。
The approach we are taking here is to enable GDB to support multiple targets in one binary, and change the PowerPC target to know about spufs.
在卸载二进制软件包之前,您可能需要备份其SysV或Upstart启动脚本;您可以修改该脚本启动您本地构建的Samba版本。
Before you uninstall a binary package, you may want to back up its SysV or Upstart startup script; you can probably modify this script to start your locally built version of Samba.
用户可以选择为使用二进制文件部署的存储过程修改这些字段。
The user can choose to modify these fields for the stored procedure being deployed using binaries.
需要做哪些修改则取决于您是下载源代码,自己编译PHP,还是直接下载二进制文件。
Which changes you need to make depend on whether you downloaded the source code and compiled PHP yourself, or downloaded binaries.
有关PVFS有一件好的事情:不需做任何修改就可以在其上运行普通文件系统的二进制形式——这在并行编程领域多少是个例外。
A good thing about PVFS is that it allows binaries meant for regular filesystems to run on it without modification — this is somewhat of an exception in the parallel programming arena.
PATH已经修改为包括gpfs二进制文件目录。
当修改源代码并重新构建二进制文件时,二进制文件的内部布局也将发生相应变化,以适应新的变化。
When a source code is modified and the binaries rebuilt, the internal layout of the binary changes accordingly to accommodate the recent changes.
WebSphere概要同 WebSphere产品的二进制或者系统文件在物理上是分离的,其仅仅被终端用户流程所读取并且不能修改。
The WebSphere profile is physically separate from the WebSphere product binaries, or system files, which are only read by the end user processes and never modified by them.
GTK +提供了针对i18n和l10n的恰当工具,会让代码(和二进制)可以在许多语言和地域上不加修改地运行。
GTK + equips you with the right tools for i18n and l10n, resulting in code (and binaries) that can be run with many languages and locales unmodified.
基于这个哲学来修改的结果是,只使用Unicode的代码清爽了许多,编码和二进制数据都需要为此做出修改。
As a consequence of this change in philosophy, pretty much all code that USES Unicode, encodings or binary data most likely has to change.
如果找到带注释的字段,该类将被修改以包含生成的toString方法,而修改后的二进制表示将被返回。
If annotated fields are found, the class is modified to include a generated toString method and the modified binary representation is returned.
在构建期间,MakeMaker所做的另一件有用的事是将所有perl二进制文件中的shebang行都修改成适合环境的那一个。
Another useful thing that MakeMaker does during build is fix the shebang line in all of your perl binaries to whatever is appropriate in your environment.
许多客户已经把现有二进制可执行程序部署到fabric上了,完全未作修改。
Many customers take existing binary executables and deploy them totally untouched to a fabric.
Derby数据库系统(二进制文件和数据库)可以复制到任何带有J2SEJVM的平台,并且无需重新编译或作其他修改就能运行。
A Derby database system (binaries and database) can be copied to any platform with a J2SE JVM and run without performing a rebuild or other alterations.
所有通过WebSphereApplicationServer安装创建的概要文件共享相同的产品二进制文件,且这些产品二进制文件是不能修改的。
All profiles created by the same WebSphere Application Server installation share the same product binaries, which they cannot modify.
您对该软件源代码所做的修改可以源代码或二进制的方式提供给您的用户。
You are authorized to provide the modified codes to your users in either source code form or binary.
从左到右交换所有位来修改由重编二进制比较器组成表1。
The modification to Listing 1 consists of rewiring the binary comparator with all the bits swapped from left to right.
有加密被添加,修改或删除自从你上次上传这个项目的二进制程序?
Has encryption been added, removed or modified since you last uploaded a binary for this product?
利用寄存器分配原理,构造图着色模型和函数,通过修改图结点颜色实现二进制水印信息位的嵌入。
The watermarking binary is embedded by using the principle of register allocation, constructing the graph coloring model and function and changing the nodes colors in the interfere graph.
您不应该依赖于它的RPM方法时声称系统是干净的,但有一点需要怀疑时,它揭示了系统二进制文件已被修改。
You should not rely on the RPM method when it claims the system is clean, but there's little need to doubt when it reveals the system binaries have been modified.
您不应该依赖于它的RPM方法时声称系统是干净的,但有一点需要怀疑时,它揭示了系统二进制文件已被修改。
You should not rely on the RPM method when it claims the system is clean, but there's little need to doubt when it reveals the system binaries have been modified.
应用推荐