• The aim of the paper is to reply the theory basis for exploiting software about these problems.

    研究主要目的通过理论分析开发此类问题软件提供分析借鉴依据

    youdao

  • Debugger is an important tool to exploit software and useful to decrease the time of exploiting software.

    调试器软件开发重要工具,它有利于减少应用软件的开发时间

    youdao

  • In fact, virtual reality is exploiting software and hardware of the computer to generate a simulation of an environment, such as an easeful classroom, a breathtaking action and so on.

    实际上虚拟现实就是利用计算机软件硬件产生种境界的仿真仿真个学习场所,一次惊险行为等等。

    youdao

  • Malicious software often infects a corporate network by exploiting security holes in web browsers to infiltrate a PC when its user visits a dodgy website.

    恶意软件经常通过嗅探网络浏览器安全漏洞感染公司网络用户访问隐藏网页时,所用电脑会感染病毒。

    youdao

  • Security experts say Stuxnet attacked the software in specialized industrial control equipment made by Siemens by exploiting a previously unknown hole in the Windows operating system.

    安全专家,该病毒通过利用Windows操作系统以前未知漏洞专门袭击西门子控制设备

    youdao

  • The bigger risk now is from "drive-by" downloads – malware (malicious software) that will try to infect Windows machines that visit a particular website by exploiting vulnerabilities in the browser.

    更大的威胁在于“强迫下载——恶意软件能够感染Windows操作系统电脑利用浏览器弱点链接特定网站

    youdao

  • Finally, software design and implementation of the test system is completed in the exploiting environment.

    最后结合系统完成开发环境下测试系统软件设计实现

    youdao

  • The feasibility and the necessity of the state overhaul are expounded from the aspects of system forming, key number choosing and data bank software exploiting.

    系统组成关键数字选择开发数据库软件技术现实性方面阐述了状态检修可行性必要性

    youdao

  • This paper aims at exploiting a graphic control strategy configuration software, in order to create required control strategy of controller.

    本文目标开发一个图形化控制策略组态软件生成控制器所需要的完成控制功能的软件。

    youdao

  • This paper introduces the software engineering based UML and the method of exploiting object oriented GIS software supported by UML.

    本文介绍基于UML软件工程以及将UML用于面向对象GIS基础软件开发方法

    youdao

  • Based on the analysis of a perfect security vulnerability collection module, this article presents that exploiting a new software-security vulnerability auto-collection software is necessary.

    本文在对完善的安全漏洞收集模型分析基础指出开发一种新的软件——安全漏洞自动收集软件的必要性。

    youdao

  • Then the author explain that the necessary and feasibility of exploiting a set of GPS data processing software, which has independence knowledge property.

    其后提出研发具有自主知识产权科研GPS数据处理软件必要性可行性

    youdao

  • Finally introduced including the main control console, the ballast work interface operation through the operating instructions of some pumps and valve which used during exploiting the software.

    最后通过软件开发过程中用到一些等的使用说明来介绍包括控制台压载作业在内界面操作

    youdao

  • To address these problems, we have started several activities that aim at exploiting the potential of open-source software for Web accessibility.

    为了解决这些问题我们开展一些活动目的利用网络访问开源软件潜能

    youdao

  • To address these problems, we have started several activities that aim at exploiting the potential of open-source software for Web accessibility.

    为了解决这些问题我们开展一些活动目的利用网络访问开源软件潜能

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定