Level One — Script Runtimes, Scopes, and Executing Files and snippets.
脚本运行时、范围、执行文件以及代码片断。
This method ensures that any external data that flows into the program is not used directly for handling files and directories or for executing processes.
这种方法就确保了所有流入程序的外部数据都不会直接用于处理文件和目录或直接用于执行过程。
Apart from executing its instructions, a process might be engaged in managing open files, processor context, address space, and data related to the program, among other things.
除了执行其指令之外,进程有时还会管理打开文件、处理器上下文、地址空间以及与程序相关的数据等。
To automate the compression process, add it as a step between staging the files in your project and executing tests.
要想自动完成压缩,将它作为一个步骤添加到文件分段和执行测试之间。
RPT creates numerous files during the course of recording a test, creating a schedule, and executing a test or a schedule.
在记录测试、创建调度、执行测试或调度的过程中RPT新建了大量文件。
But you now see files for all those threads that were executing during the timeframe that you're interested in (even if those threads didn't happen to log during that timeframe).
但是现在您看到了在您感兴趣的时间期限内执行的所有那些线程(即使那些线程碰巧没有在该期限中记录日志)的文件。
The Hello utility isn't much, but it's a useful scaffold for exploring JAR files, starting with executing the code.
Hello实用工具内容并不多,但是对于研究JAR文件却是一个很有用的“脚手架”,我们先从执行此代码开始。
Define external table with multiple files instead of one huge single file; when executing load or select operation with PDQ priority set, IDS exploits the parallelism.
使用多个文件、而不是一个超大文件定义外部表;使用PD Q优先集执行加载或选择操作,以便IDS利用“并行性”。
You can do this by executing the command (command should be entered on one line) in Listing 6 from a Linux terminal window while you are in the directory containing the C++ source files.
当您位于包含 C++源文件的目录时,您可以通过从Linux终端窗口中执行清单6中的命令(输入的命令应该在一行)来完成这项工作。
If each of the above DB2 agents is executing same stored procedure, there will be four log files, with these names
如果上面的每个DB2代理都正在执行相同的存储过程,那么就会生成4 个日志文件,其名称分别如下所示
Thus files and executing programs may be lifted from the fixed computer and used on the handheld device.
因此,文件和执行程序可以从固定解除计算机和手持设备上使用。
Ill-intended creators of malicious software are quick to seize on hot topics to dupe people into opening files or executing applications that allow stealth programs to invade their machines.
恶意软件的开发者善于迅速抓住热点话题,诱骗人们打开或执行能够侵入电脑的间谍程序或应用。
Ill-intended creators of malicious software are quick to seize on hot topics to dupe people into opening files or executing applications that allow stealth programs to invade their machines.
恶意软件的开发者善于迅速抓住热点话题,诱骗人们打开或执行能够侵入电脑的间谍程序或应用。
应用推荐