• No one can understand the hurt and pain of life, not a time to be able to recover, I can only share memory protection.

    NO - 16、无人明白一生不是时间复原的,只能保护那份记忆

    youdao

  • The PDP-15 was compatible with the earlier PDP-9 and included various advanced features, including memory protection and floating points.

    PDP-15兼容早期的 PDP-9包括各种高级功能包括内存保护浮动

    youdao

  • Even recent memory protection techniques like segmentation, paging, protection keys and simulated segmentation flunks to assure data integrity.

    即使是近期内存保护技术例如数据分割分页、保护秘模拟分割都无法确保数据的完整性

    youdao

  • In the 1990s, when Copland was initiated, "next-generation" meant supporting memory protection and preemptive multitasking, both of which classic Mac OS lacked.

    Copland始于上世纪90年代,“新一代是指支持内存保护抢先式任务,当时MacOS不支持项功能。

    youdao

  • Unfortunately, the memory protection mechanisms of the x86 processors (the most common processors) don't easily support this; normally if a page is readable, it's executable.

    遗憾x86处理器(常见的处理器)内存保护机制无法容易地支持这点通常如果一个内存页可读的,它就是可执行的。

    youdao

  • Vega processors included a custom read barrier instruction that included bit field checking in reference metadata as well as special virtual memory protection for GC-compacted pages.

    Vega处理器包含一个客户化屏障指令,它具有字段检查元数据针对GC压缩页面的特殊虚拟内存保护

    youdao

  • Furthermore, a Memory Protection Unit (MPU) has been added, which is transparent to existing software but allows new applications to protect specific code or data during execution.

    此外,还增加一个存储器保护单元(MPU),功能虽然对于现有软件透明的,应用软件执行期间可以保护特定代码数据

    youdao

  • This mode provides more protection, because the data is mirrored to another node, just in volatile memory instead of the non-volatile disk.

    模式提供更多保护因为数据镜像另一个节点这仅仅是针对易内存不是非失性磁盘。

    youdao

  • The test environment used a System i Model 520 with two processors, 32 GB of memory, and 98 disk drives with RAID-5 protection.

    这个测试环境??SystemiModel 520,两个处理器32GB内存 98 个磁盘驱动器( RAID-5保护)。

    youdao

  • The virtual memory area (VMA) pointer needs to be added in as the first parameter followed by the usual four parameters (start, end, size, and protection flags).

    虚拟内存区域VMA指针作为第一参数然后四个常用参数startendsizeprotection标记)。

    youdao

  • This paper is focused on the research of virtual memory technology and space domain protection mechanism in real-time systems.

    本文主要研究实时系统中的虚拟内存技术以及空间保护机制

    youdao

  • The addressed page is not present in memory, the corresponding page Table entry is null, or a violation of the paging protection mechanism has occurred.

    址的不在内存中,对应条目的,或者违背式管理保护机制。

    youdao

  • Modern operating systems take advantage of the protection mechanisms implemented by the processor to distinguish various types of memory usage.

    现代操作系统利用处理器实现保护机制辨别各类内存应用

    youdao

  • History districts, the city vitality as the sediment with the long history river, influence the survival of city's memory, while they are struggling in self protection and revival.

    历史街区这个历经漫长岁月沉积下来城市元素,既关系到城市记忆存亡,又受困自身保护复兴

    youdao

  • Jinan commercial port area for the old buildings, old streets of the Environment Protection and improvement of proposed urban memory of the feasibility of the proposed design elements.

    为济南商埠区的建筑、老街巷风貌保护改造提出城市记忆设计要素可行性建议

    youdao

  • Relatively comes with a low memory footprint for 24 hour background protection.

    相对带有一个24小时背景保障内存占用

    youdao

  • Limit protection, overload protection, automatic return, as well as power lost memory intelligent configuration, ensure the safety of the operation of the user.

    限位保护过载保护、自动回位以及记忆等智能配置保证用户操作安全

    youdao

  • We have solved the problem of real-time automatic diagnosis for normal failures in the observation system and the problem of the power failure protection for its data memory chips.

    解决了数据存贮器自动保护观测系统常见故障自动实时诊断问题

    youdao

  • The protection of the memory location is transferred to the memory cloner when a combined response is received at the memory cloner for a particular naked write operation.

    特定操作存储器克隆接收组合的响 应时,将存储器位置保护转移到存储器克隆体。

    youdao

  • After introducing the organization form of the memory database, it focuses on the HASH arithmetic of index and protection of integrity and consistence of the data.

    介绍内存数据库组织形式之后,本文重点分析了索引HASH算法以及数据完整性一致性保护

    youdao

  • Since memory is the primary place to store the data, the most effective way to against attack is the protection of off-chip memory, i. e. confidentiality protection and integrity protection.

    鉴于存储器数据主要驻留场所,因此,防范攻击首要是对处理器的片外存储器进行保护,其关键技术手段包括存储器的机密完整性保护。

    youdao

  • The campus is our home, must be our protection, to cherish, enjoy the campus environment, let that pure and fresh bright in years left on the floor of the once beautiful memory.

    校园我们必须我们来保护珍惜享受校园清新环境岁月的光辉曾经地板留下美丽的记忆

    youdao

  • Overview of operating system 2. Process management 3. Memory Management 4. Storage management 5. Distributed systems 6. Protection and Security.

    作业系统概述2行程管理3记忆体管理4储存体管理5保护保密6分散式系统

    youdao

  • It is able to provide protection for pen drives, USB sticks and memory CARDS.

    能够驱动器U存储卡提供了保护

    youdao

  • It is able to provide protection for pen drives, USB sticks and memory CARDS.

    能够驱动器U存储卡提供了保护

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定