• The mantissa can also be found through bit masking, though the algorithm is far less obvious.

    尽管算法不是很明显,但还是可以通过屏蔽来查找尾数

    youdao

  • Nearly every modern OS makes use of a bit-masking permission-based model that deals with the control of resources by principals, based on principals and groups.

    几乎每个现代操作系统使用基于屏蔽权限模型,该模型基于主体主体处理资源控制

    youdao

  • Permissions were based on masking a 32-bit integerthe example application and requirements would have needed at least 64 bits to handle the required atomic permissions.

    各种权限基于屏蔽一个32位整数——示例应用程序要求至少需要64才能处理所需原子权限。

    youdao

  • Whereas language is every bit as effective for masking out true feeling as it is for expressing them, much of nonverbal communication is beyond our purposefully control.

    但是语言完全被当作有效掩盖真实感觉之外,而照原样表达他们许多语言是被我们自觉控制的。

    youdao

  • Whereas language is every bit as effective for masking out true feeling as it is for expressing them, much of nonverbal communication is beyond our purposefully control.

    但是语言完全被当作有效掩盖真实感觉之外,而照原样表达他们许多语言是被我们自觉控制的。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定