网站首页  词典首页

请输入您要查询的英语单词:

 

单词 Byte
例句
(1) Each character requires one byte of storage space.
(2) This procedure sends a byte to the output device.
(3) The index relates key values to the relative byte address locations of the data record.
(4) The first byte is set to the least significant byte of the number and the second to the most significant byte.
(5) The file pointer is incremented after the byte has been written.
(6) You should enter an approximate number of 512 byte blocks which this media type can hold.
(7) The second argument's least significant byte is written to the file.
(8) A 4 bit word; half a byte.
(9) Compares this Byte object to another object.
(10) All were single byte read operation mode.
(11) Each instruction can operate on word and byte data.
(12) Converts a byte array from one encoding to another.
(13) Mismatch between maintained byte array and pinned byte array.
(14) All computers are based on the eight-bit byte.
(15) The byte count is too small.
(16) Every byte has a unique address.
(17) An XML parser can process any byte stream.
(18) Let show a group synthesis byte, determine decimal value?
(19) A byte composed of three binary element.
(20) Blobspaces are used to store text and byte data.
(21) A byte, bit, nibble, or other small data type.
(22) Writes the specified byte to this output stream.
(23) This program check zip file type using byte frequency.
(24) Floating point variables are stored in binary floating point format with their least significant byte first.
(25) You should enter an approximate time for this media unit to transfer a 512 byte block of data.
(26) EOF is only true if PTR is set beyond the last byte written to in the file.
(27) It is sent as a pair of characters, least significant byte first.
(28) When reading a serial file, EOF would go true when the last byte of the file had been read.
(29) Thus for 16 colour screen, where each pixel requires four bits, each byte would describe two pixels.
(30) Integer variables are stored in twos complement format with their least significant byte first.
(31) If the EVPD parameter bit (for enable vital product data) is zero and the Page Code parameter byte is zero, then the target will return the standard inquiry data.
(32) Byte, it became possible because of the use of technology of perpendicular recording.
(33) The IA-64 Linux kernel uses little-endian by default, but allows for the possibility of using big-endian byte order.
(34) The first position producing device of the checking byte produces the inserting position N ( N is a plus integer) of the checking byte according to the instruction and a preconcerted principle.
(35) Value was either too large or too small for an unsigned byte.
(36) In 40s of last century, Claude Shannon, the father of Information Theory, brought forward the physical laws followed by the information(in form of byte) storage and transmission.
(37) Reads the next byte of data from the input stream.
(38) The PDU message format describes a generic SMS message as a byte stream.
(39) You can get the BLOB field data instead of opening file. The point is you need to return a Byte Array.
(40) A lead byte specifies that it and the following trail byte comprise a single 2 - byte - wide character.
(41) This means that we have to process the byte stream chunks in order to successfully read a complete package.
(42) The controller reads the command register and sees the write command. it reads the data-out register to get the byte, and does the I/O to the device.
(43) PDCP PDU is a bit string that is byte aligned (i. e. multiple of 8 bits) in length.
(44) It then builds a message object using the byte stream passed by the client.
(45) Pass the GeneralString bytes along with a getTagAndLengthBytes() method, which will return the complete byte string representation of the realm field.
(46) Therefore, if you want to store only one byte, if you tried to do it directly on an unaligned address, it would both go into the wrong location and clobber the remaining bytes in the quadword.
(47) A 512 byte area of disk storage. Each disk sector contains two 256 byte disk data blocks.
(48) Error: byte array truncation to a length of { 0 }.
(49) The latter command enables the running byte count with --bytes.
(50) Little-endian means that the least significant byte is stored at the lowest memory address and the most significant byte is stored at the highest memory address.
(51) Bit, byte and character are often used interchangeably. 8 bits equal 1 byte, or a character.
(52) Specifically, the certificate must have been serialized into the file as a DER-encoded byte stream; the -export option of the Java keytool utility creates files in this format by default.
(53) In addition, the Memory window can display double - byte characters.
(54) VSAM arranges records by an index key, relative record number, or relative byte addressing.
(55) If a storage unit can store a byte, 64KB of memory is a Shared storage unit number for B.
(56) The fallback emits a user - specified replacement string instead of a decoded input byte sequence.
(57) In practice, using an 8-bit byte, the alpha value ranges from 0-255 instead of 0-1, where zero is transparent and 255 is opaque.
(58) The byte ordering (Big-Endian or Little-Endian) for a storage access is specified by the operating system.
(59) A byte can represent a single character, as a letter a digit, or a punctuation mark.
(60) Slapper: Hey , why should Sky - Byte have all the fun Let's just wreak havoc. Right laser!
(61) No mapping for the Unicode character exists in the target multi - byte code page.
(62) status: SCSI status byte as defined by the SCSI standard.
(63) The byte enablesindicate the size of the transfer and must be consistent with the byte address.
(64) Unfortunately, there is no EBCDIC encoder by default, so we'll convert the value to a UTF-16LE byte array (which just adds in a "0" byte for the second byte of each character).
(65) Big-endian means that the most significant byte is stored at the lowest memory address and the least significant byte is stored at the highest memory address.
(66) Thus the byte answering form followers make the calling system more reliable in the inquiry process of host address system.
(67) In the case of FDDI, the FC field is placed in the Least Significant Byte of this field.
(68) Encoding ELFDATA 2 LSB specifies 2's complement values, with the least significant byte occupying the lowest address.
(69) Data reduplication is a process that looks for byte streams within files to identify similar files.
(70) When the object is later re-created from its byte string, it will be a new in-memory object identical in structure and value to the original, though located at a different memory address.
(71) The routines in Table 4-2 convert longs and shorts between host and network byte order.
(72) Size of memory is generally measured in byte, namely the storage space of a character.
(73) Stored with a byte integer part of the back of each byte stored two decimals.
(74) Each byte is connected with an 8 pin terminal block.
(75) Encoding ELFDATA 2 MSB specifies 2's complement values, with the most significant byte occupying the lowest address.
(75) is a sentence dictionary, on which you can find good sentences for a large number of words.
(76) In those days, working with computers meant writing code to save a byte here and an instruction cycle there.
(77) A 32 byte directory entry describing an allocated data set or volume.
(78) Causes the output file to be created in UTF - 8 format, with a byte order marker.
(79) Deduplication is the process of examining a data set or byte stream and storing and/or sending only unique data; duplicate data is replaced with a pointer to the first occurrence of the data.
(80) Each index record contains a five - byte header that may be preceded by a variable - length header.
(81) Drain electrode being biased to ground, unselected units on same byte word line are forbidden.
(82) Inserts a new print job , whose content is a Byte array , into the queue.
(83) It is based on floating operations, which need about 4 K byte memory units ( 8 bit microcomputer ).
(84) Store the resulting value in one extra byte at the end of the file.
(85) As all objects start on an 8 byte boundary, and the size is divisible by 8, the bottom 3 bits are not used for the size; we use them for flags to indicate different states of the object.
(86) Little-endian means that the least significant byte has the lowest address (the word is stored little-end-first).
(87) A byte is the smallest unit of processing in any computer architecture.
(88) The remote archive is opened on the remote machine, and the byte stream from cat is sent to a subshell that first changes directory, and then it extracts the archive.
(89) PDCP SDUs are bit strings that are byte aligned (i. e. multiple of 8 bits) in length. A compressed or uncompressed SDU is included into a PDCP PDU from the first bit onward.
(90) Every time the stream encounters a N, the next byte read is the repeat count, followed by the character.
(91) Most of the available length-based Chinese-English sentence alignment algorithms take byte as their sentence length computation unit.
(92) Now that you've eliminated the branch, you need to load your conversion factor into every byte of the conversion register.
(93) It also sends a session ID, a random byte string, and its digital certificate.
(94) A bit representation that fits in a byte. The representation of each member of the basic character set in both the source and execution environments shall fit in a byte.
(95) The carry from bit3 to bit4 needed for adding packed binary coded decimal number correctly, where two binary coded decimal digits reside in one8-bit byte.
(96) NOR flash memory can typically be programmed a byte at a time, whereas NAND flash memory must be programmed in multi-byte bursts (typically, 512 bytes).
(97) Finally add a method, appendBytes(StringBuffer buf, byte[] bytes, String indent), which formats byte arrays to the familiar columns of hex numbers and associated ASCII characters (Listing 9).
(98) An array of byte values that contain the encrypted recipient keying material.
(99) The higher velocity of STM signal is been gained by the multiplexing of N STM - 1 byte.
(100) The research shows that, with this method, the face image can be compressed in high quality within the pre-specified byte count, and will be possible to solve the security problem of certificate.
(101) Alternative spelling of byte.
(102) All three of these may or may not be preceded by a Unicode byte order mark in either UTF-8, big-endian UTF-16, or little-endian UTF-16.
(103) Moreover, when value compression is used, the system consumes one byte less for each table entry for all columns in which a NULL value is allowed.
(104) A method of serial communication by using Byte variable in VB is discovered.
(105) Second, when we wrote to the record store with writeRecord(String str), we first converted the Java string parameter into a byte array.
(105) try its best to collect and build good sentences.
(106) 256 by 4 implies that two devices are needed to complete the byte.
(107) Prepend the cname tag byte (context-specific tag number 1) and length bytes before the SEQUENCE of Step 5 above.
(108) A wide character is a 2 - byte multilingual character code.
(109) A single selector and segment descriptor can be placed in the global descriptor table that identified the first 1M byte of memory as that interrupt segment.
(110) A digital channel is scramble by applying a random 8 byte number to it, th is random number is called the Control Word (CW) , it is saved and sent out to subscribers.
(111) The least significant bit of the cmd byte is the phase indicator, which is used to differentiate a new command from the retransmission of an old one.
(112) Big endian machine: It thinks the first byte it reads is the biggest.
(113) The ANSI character set used by many Western operating systems is a single - byte character set.
(114) You cannot even make assumptions about byte alignment(), such as a 2 - byte or 4 - byte boundary.
(115) In char, byte , and short you can see the effect of promotion with the arithmetic operators.
(116) Count the number of ones in each byte of the 8-byte block; if the number of ones is even, make it odd by setting the least significant bit to one.
(117) This byte array will hold all the bytes of the INTEGER data type structure.
(118) RS ( 256,252 ) code is extended from RS ( 255,252 ) code , a byte - wide single error - correcting and double - error detecting cyclic block code.
(119) In hexadecimal notation, it takes merely two characters to represent a byte.
(120) RM 40 works by microprocessors with 4 k byte program storage which is composed of 23 subroutines.
(121) With the Byte Collection Editor, you can view and change an array of bytes.
(122) The least used byte becomes a special byte that indicates that a length and code character follows.
(123) Expand accessibility to support internationalisation, double - byte characters and Right to - Left support for Arabic and Hebrew languages.
(124) The most obvious issue is that the interface in Listing 6 requires a JNI call for each bit set or retrieved, as well as a JNI call to read a byte from, or write a byte to, the serial port.
(125) It accepts a Base 64 encoded cipher byte array, and decodes and decrypts it to return the clear data string.
(126) I have declared a byte array named ivBytes, which will hold the initial vector bytes for each step of the cipher block chaining.
(127) The multibyte integer representation used by the TCP/IP protocols is sometimes called network byte order.
(128) In looking at the previous code before the pipe, a byte stream of the files is created on the standard output.
(129) Big endian machines store the most significant byte first ( at the lower address ).
(130) And the N numbers of STM - 1 can form higher rate STM - N signals with byte interleaved.
(131) I could then map the new prefix to a protocol handler, which would return the byte stream for the resource, as shown in Listing 5.
(132) We described all kinds of obfuscating methods as viewed from byte code and designed effective method to produce redundant code.
(133) Classes are represented by objects which contain all the symbolic information of the given class: methods, fields and byte code instructions, in particular.
(134) In addition, this new version of the NFS protocol supports byte range file locking, whereas previous versions used the lockd protocol provided by the Network Lock Manager.
(135) As a result(http:///byte.html), the 20 byte block allocated by the func() function is lost and results in a memory leak.
(136) The load/store instructions and the loop counter were geared for processing a single byte at a time.
(137) Each byte in the entire file is taken by no more than one section at a time, but there can be orphan bytes that are not covered by a section.
(138) We take the result and add a record header byte "0x14" to indicate "finished" and length bytes "00 00 0c" to indicate that we're sending 12 bytes of verify data.
(139) The Perl interpreter then converts the byte - code representation to machine code before execution.
(140) When receiving data from a native language application, the byte stream is fed into a new instance of the class, and getter methods are used to read the attributes.
(141) It is the byte string sent from the card to the terminal or from the terminal to the card, without transport control characters.
(142) One byte of cipher text is generated for every byte of plain text contained in the message.
(143) In little endian machines, least significant byte is followed by the most significant byte.
(144) The cbd instruction takes an address and generates a control word that can be used by shufb to insert a byte at the proper location in the quadword for that address.
(145) When statistical software reads a "raw" character format data file consisting of ASCII or EBCDIC characters, it must read each byte in sequence.
(146) Also note that the first two types in the class clause are LongWritable and Text, which are the byte count and line of text, respectively.
(147) When students do these embedded experiments, they do often face the problem of the transformation between big-endian and little-endian about byte order.
(148) Blobspace: A blobspace is a logical storage unit composed of one or more chunks that store only TEXT and BYTE data.
(149) The constructors of default character encoding and the default byte - buffer size are appropriate.
(150) C allow direct language right place, byte address and operate.
(151) The getTagAndLengthBytes() method will prepend the name-string tag byte (context-specific tag number 0) and length bytes before the SEQUENCE and return the complete name-string structure.
(152) The scratchpad also contains a configuration byte to set the desired resolution of the temperature to digital conversion.
(153) If so, the racluster command described above is run, and the IP address and associated byte count for all connections to that address is recorded in the %hosts hash.
(154) When represented in a sequence of data bits most significant bit of a byte is first.
(155) Binary mode. End of file is reached at last byte of the file. No conversions.
(156) We also need methods to convert data to byte stream and byte stream to data, some of these functions are also provided in the CIOCPBuffer class.
(157) The constructors of this class assume that default character encoding and default byte - buffer size are appropriate.
(158) After the pipe, change to a different directory and then extract the byte stream again from the standard input.
(159) The counting of string length using a byte is referred to as byte semantics in this article, and the counting of string length using the number of characters is referred to as character semantics.
(160) Indeed on a byte, which is the computer's memory unit, can be coded up to 256 values.
(161) Notice in the above code the maximum possible hexadecimal values for char, byte, and short.
(162) In order to improve the properties of a burst-indicator subcode it is proposed to encode the bits of a burst-indicator subcode byte into different channel words.
(163) Almost any interesting Basic program was full of low-level hacks, where one had to poke memory byte 714 to change the screen background color to yellow.
(164) The Apple partition map contains several 512 - byte data structures, and each partition uses one data structure.
(165) The Command code and Byte count shown above must be sent,() but the data is ignored for those two bytes.
(166) The following example illustrates the difference in byte order between big endian and little endian machines.
(167) Prior to DB2 UDB V8.2, a Unicode database could only be defined with the collating sequence IDENTITY, which means that the characters are compared by their byte encoding.
(168) If half the time has elapsed, you'll end up with an alpha of .5 (128 as a byte). By calculating the alpha value from the actual elapsed time, you guarantee that the blend always finishes on time.
(169) If this value is reached and an extra byte is counted, the starts over at zero.
(170) Unable to convert Multi Byte string to Wide Char String. The script could not be parsed.
(171) In the deserializer, parallel data are clocked out by byte clock.
(172) The important information includes timestamp, protocol type, port number, packets, byte, I/O interface operator and prefix etc.
(173) In very simple color display modes , a single pixel of a bitmap can be represented by 256 different colors; therefore, one byte per pixel is needed.
(174) The basic unit of storage in a computer is a byte, or 8 bits.
(175) While decompiler usually chop the chain of byte codes into meaningful pieces. In real world, it is like reading a book, one sentence and then the next sentence.
(176) In the case of a single-byte character encoding scheme, a single byte constitutes a character and the length of a single byte string is the same as the byte length of the string.
(177) End of file is reached at last byte of the file.
(178) In the Byte Count box, type the number of bytes you want the debugger to watch.
(179) Most of the available length-based Chinese-English sentence alignment methods take Byte as their sentence length computation unit.
(180) The header is followed by a one - byte command code, and any arguments to the command.
(181) When you cast the integer into a single byte, only the least significant byte (0x00 to 0x7f) will be copied as a hex value to the single-byte array.
(182) To avoid this, you need to first load the quadword from memory, insert the value into the appropriate byte in the quadword, and then store it back.
(183) The type clause also delineates the incoming key and value, which in the case of reading a file are the byte count and the line of text, respectively.
(184) With TCP being a byte stream without any message boundaries, this works fine and dandy.
(185) It also provides for byte, halfword, word, and quadword operand fetches and stores between storage and a set of 32 Vector Registers (VRs).
(186) The function or procedure name may be accompanied by optional information, such as module name, line number, byte offset, and parameter names, types, and values.
(187) Indexing of multibyte strings is not reliable, since S represents the ith byte (not necessarily the ith character) in S.
(188) In general, the lower 128 characters of a multibyte character set map to the 7-bit ASCII characters, and any byte whose ordinal value is greater than 127 is the lead byte of a multibyte character.
(189) Compile time normally consists of translating programs into a machine - independent byte code representation.
(190) It then passes on the bit string to the getTagAndLengthBytes() method, which will return the complete ASN.1 byte array representation of the kdc-options field.
(191) On the door of a computer store: Out for a quick byte.
(192) All byte wide memories have standard SRAM pinouts. they operate like SRAMs and provide nonvolatile storage with no requirement for battery backup.
(193) Vector instructions operate on vectors of scalar quantities and on scalar quantities, where the scalar size is byte, halfword, word, and quadword.
(194) The mdr command takes an address/symbol and a byte count and displays the raw contents of memory starting at the specified address for byte-count number of bytes.
(195) The Kprobe is architecture specific and inserts a breakpoint instruction at the first byte of the instruction to be probed.
(195) try its best to collect and create good sentences.
(196) You can generate short pauses by sending hex- 0 bytes, although two pulses will transmit for each byte because of the start and stop bits.
(197) The run length encoding (RLE) compression algorithm requires very little processor time and works well for data that has lots of the same byte value repeated in consecutive locations.
(198) Scriptability—The format includes tags that provide sequences of byte codes to be interpreted by a stack machine.
(199) To avoid trying to handle the header of the CSV, I first check to see if the byte count (the key object) is not zero.
(200) A virus that has the ability to change its byte pattern when it replicates thereby avoiding detection by simple string scanning techniques.
(201) Items in the constant pool are variable length, with the first byte of each item identifying the type of item and how it should be decoded.
(202) As this method takes two byte arrays and returns another byte array, it can be used in series with itself any number of times to concatenate any number of byte arrays.
(203) The protocol encodes request data as a byte count followed by the payload asa blob.
(204) The baud rate for the interface is 31.25 Kbaud with 1 start bit, 8 data bits, and 1 stop bit, giving a period of 320 microseconds per serialized byte.
(205) The pointer you receive will be aligned with at least an8- byte boundary.
(206) Thus, the byte code is checked for correctness before it is executed.
(207) They said that Terracotta uses a non-API based byte code enhancement approach that works very well for solutions aiming for the data replication problem space.
(208) The named file system attribute classification is a byte stream that is associated with a directory or file and is referred to by a string name.
(209) If the number of ones in a byte is already odd, you will set its least significant bit to a zero.
(210) If it is, you will exclusive OR the last byte of the 8-byte parity-fixed block with 0xf0 (11110000).
(211) Prior to DB2 9, DB2 had some string functions that worked on character and graphic data from a mixed perspective of bytes and double byte units.
(212) The TCP/IP protocol is a fast networking option for low bandwidth applications, and is ideal for small devices or for cases where a cost is associated with every byte of data transferred.
(213) All the controlling program can be downloaded to 4 K byte flash memory in single chip computer.
(214) Usually,(http:///byte.html) each of the encoded bytes are prefixed with another byte to indicate that the next byte is in fact a dictionary entry.
(215) Code bytes - byte representations of the actual machine or MSIL instructions.
(216) The second line of assembler is a jump instruction that jumps 1 byte forward.
(217) The amount of data you can store on a single DVD is several Giga Byte.
(218) Programmers can compile the Python source code to java byte code, running it on JVM ( Java Virtual Machine ).
(219) Note: Endianness refers to the whether the most significant or least significant byte has the lowest address.
(220) After the stop bit is received,() the device will acknowledge the received byte by bringing the Data line low and generating one last clock pulse.
(221) I then extract the initialization vector (IV) into a byte array, block encrypt the clear data, and prefix the IV bytes to the encrypted data bytes.
(222) This byte code level change, although a big step, does not in itself bring us to true bootstrapping because we are still left with the JDK dependencies.
(223) This is a 5-byte instruction, with MOV EAX opcode as the first byte and the service index as remaining 4 bytes.
(224) Javassist is a revenue analysis, editing and the creation of Java byte code library.
(225) Writing TH, TL, and the configuration byte is done using a memory function command.
(226) Thus, I can cast the result of the bitwise operation as a byte, put the byte in a single-byte array, and return the array to the calling application.
(227) This is done by representing the data in the most elementary of structures -- a byte stream also known as an octet stream.
(228) Altering a column must not make the total byte count of all columns exceed the maximum record size (SQLSTATE 54010).
(229) There are eight bits in a byte of binary computer code.
(230) No, UDT can transfer a data buffer from one single byte to multiple tera -bytes, as long as your system can provide enough resources.
随便看

 

英语例句大全共收录104207条中英例句词条,基本覆盖所有常用英文单词的例句、长难句及中文翻译,是不可多得的英语学习材料。

 

Copyright © 2000-2024 Suppus.net All Rights Reserved
更新时间:2024/7/9 6:28:58