|
In computer programming, a combined database management, spreadsheet and graphics package.
|
|
|
在计算机程序设计中,一种兼有数据库管理、电子报表和绘图功能的组合程序。参阅spreadsheet。 |
|
In computer programming, a high level language instruction that places a value in a program specified memory address, location.
|
|
|
在计算机程序设计中,一种高级语言的语句或指令,其功能是将一个值放到程序指定的内存地址单元内。 |
|
In computer programming, a process which repeats the same series of processing steps until a predetermined state or branch condition is reached.
|
|
|
计算机程序设计中的一种处理方法,即重复进行相同的一系列处理步骤,直到一个预定的状态或转移条件实现时为止。 |
|
In computer programming, section of a COBOL program that represents a logical processing entity.
|
|
|
在计算机程序设计中,COBOL程序中代表一个逻辑处理实体的一部分。 |
|
In computer programming, section of a COBOL program that represents a logical processing entity.
|
|
|
在计算机程序设计中,COBOL程序中代表一个逻辑处理实体的一部分。 |
|
In computer programming, to copy from locations in main storage into locations in the same main storage.
|
|
|
在计算机程序设计中,将主存某些单元的内容复制到同一主存中的其它单元中去。同transfer。 |
|
In computer programming, to resolve a string of characters, representing for example a program statement, into its elemental parts as defined by(say) the programming language.
|
|
|
在计算机程序设计中,从字符串(例如代表程序的语句)中分辨出程序设计语言中所定义的基本语法成分。参阅compiler。 |
|
In computer security, a computer program with an apparently or actually useful function that contains additional(hidden) functions that surreptitiously exploit the legitimate authorizations of the invoking process to the detriment of security.
|
|
|
在计算机安全学中,一种计算机程序,表面上或实际上有某种有用的功能,而含有附加的(隐藏的)可能利用了调用进程的合法特许来危害系统安全的功能。 |
|
In computer security, a security model rule stating that once an object is made inactive it cannot be accessed until it is made active again.
|
|
|
计算机安全学中,一条安全模型规则,即一客体在被置为不活动后,不能被访问,直至又被置为活动。 |
|
In computer security, a security model rule stating that once an object is made inactive it cannot be accessed until it is made active again.
|
|
|
计算机安全学中,一条安全模型规则,即一客体在被置为不活动后,不能被访问,直至又被置为活动。 |
|
In computer security, an error of omission or oversight in software or hardware that permits circumvention of the access control process.
|
|
|
在计算机安全学中,由于软件或硬件的疏忽引起的错误。这种错误躲过了存取控制进程。 |