纯粹的函数性语言不依赖保存或检索状态的操作,因此不允许破坏性赋值。
Pure functional languages do not rely on operations that save or retrieve state and do not allow destructive assignments.
如果这些方面中有任何一些失败了,那么结果将是破坏性的,影响操作成本及客户满意。
If any of these areas fail, the results can be devastating, affecting operational costs and customer satisfaction.
如果恢复功能实现正确,整个系统只会有一个破坏性的操作:清空垃圾箱。
If undo is implemented correctly, then there's only one destructive operation in the entire system: emptying the Recycle Bin.
最有可能的操作最有用的且无破坏性的命令应该在左软键(SK1)上显示而不要在右软键(SK2)菜单里面再次重复。
Most likely action the most useful non-destructive command should appear on the left soft key (SK1) and should not be repeated in the right soft key (SK2) menu.
使用操作系统:使用“无害”的gcore命令或破坏性的kill -6 或 kill -11命令来生成一个内核文件。
Using the operating system: Use the nondestructive gcore command or the destructive kill -6 or kill -11 commands to produce a core file. Then, extract a heap dump from the core file using jmap
当在缺少预先OO设计的情况下使用时,没有任何操作会像在类之间复制代码那样具有破坏性。
When used in the absence of an up-front OO design, nothing creates more havoc than copying code from one file to the next.
LivePartitionMobility允许转移逻辑分区,这样就可以在最合适的时候执行以前具有破坏性的操作。
Live partition Mobility allows moving logical partitions around such that previously disruptive operations on the machine can be performed when it bests suits you.
在经过破坏性读出之后,立即将数据重新写入存储器的操作。
To write data back into memory immediately after a destructive readout.
本系统充分利用CAN无破坏性的基于优先权的总线仲裁机制,解决了多个教室同时操作时引起的总线冲突问题。
This system makes best use of CAN's non-ruinous characteristics that are based on priority of bus arbitrage mechanism, solving the bus conflict issue of multi-classroom simultaneity operation.
恶意用户可以使用调试器连接到您的计算机、在您的计算机上启动应用程序、访问您计算机上的数据以及执行其他有害或破坏性的操作。
A hostile user can connect to your computer, launch applications on your computer, access data on your computer, and perform other mischievous or destructive actions by using a debugger.
恶意用户可以使用调试器连接到您的计算机、在您的计算机上启动应用程序、访问您计算机上的数据以及执行其他有害或破坏性的操作。
A hostile user can connect to your computer, launch applications on your computer, access data on your computer, and perform other mischievous or destructive actions by using a debugger.
应用推荐