您要查找的是不是:
- memory protection key 存储保护键
- Gets or sets the data and memory protection flags. 获取或设置数据和内存保护标志。
- Specifies the scope of memory protection to be applied by the. 方法应用的内存保护范围。
- Specifies the scope of memory protection to be applied by the Protect method. 指定将由Protect方法应用的内存保护范围。
- A key benefit of an MMU is memory protection: an OS can use it to protect against errant programs, by disallowing access to memory that a particular program should not have access to. 使用MMU的一个重要好处就是“内存保护”:OS通过禁止没有访问权限的程序读取某些存储区域,来减少不良程序带来的错误。
- Protection Key(dongle) is not present , Could you connect the device on your computer, and re-run progrom? 重装嘞几次都是一样的提示、应该不是软件本身的问题嘞、请高手指点。
- These stalwart computers have always had plenty of resiliency built into the system through standard features such as redundancy and memory protection. 这些可靠的系统始终都具有通过诸如内嵌于系统中的冗余度和存储器保护等标准特性而实现的高可恢复性。
- AMISOM forces protect key sites in Mogadishu including the airport, the presidential palace, and the seaport. 该特派团军队保卫着摩加迪休的关键场所,包括机场、总统府邸和海港。
- S. missile defense plan for Europe, saying that the system is untested and would not protect key American interests from an attack by Iran. 他们表示,这个系统还没有经过测试,无法保证美国的关键利益免遭来自伊朗的袭击。
- The native operating system is not required to have its own memory protection capabilities. 本机操作系统不必有自己的内存保护功能。
- Must provide memory protection at least for the interrupt vector and the interrupt service routines. 至少要为中断向量和中断服务程序提供存储保护。
- Call the static Unprotect method while passing an array of bytes to decrypt and the memory protection scope. 调用静态Unprotect方法,传递要解密的字节数组和内存保护范围。
- Three divisions of security troops were assigned to each army group to allow the commandants to protect key bridges, roads, railway junctions and supply dumps. 每个集团军群有三个警备师来由这位司令指挥,保护战区内的关键桥梁、道路、铁路交叉点和补给营地。
- Call the static Protect method while passing an array of bytes to encrypt, the entropy, and the memory protection scope. 调用静态Protect方法,传递要加密的字节数组、平均信息量和内存保护范围。
- Hence, the OS needs to know the addressing structure, interrupt structure, IO organization and memory protection features of the computer system. 因此,操作系统需要了解计算机系统的地址结构、中断结构、I/O体系结构及存储器保护特性。
- It can executethe memory protect, Cache replacement, disable Cache and disable TLB correctly, and also calculate ? 功能模型通过VCS仿真调试,可以正确的执行内存保护、Cache替换、Cache刷新、TLB刷新等功能测试程序,以及计算圆周率?
- The site protects key threatened species, including giant arapaima fish, the Amazonian manatee, the black caiman and two species of river dolphin. 保护区为许多珍稀濒危动物提供保护,例如巨骨舌鱼、亚马逊海牛、黑凯门鳄和两种淡水豚类。
- New memory protection technology is named amount to to defend according to carrying out (DEP) , it can prevent code move on illegal memory address. 新的内存保护技术被命名为数据执行防护(DEP),它可以防止代码在非法的内存地址上运行。
- The terrible scene was engraved on his memory. 那可怕的情景铭记在他的记忆里。
- Several million army men and civilians fought shoulder to shoulder tenaciously for more than two months,successfully saving major rivers,lakes and dikes,protecting key cities and trunk railway lines,and ensuring the safety of the lives of the masses. 数百万军民坚守一线,团结一心,严防死守,连续作战,经过两个多月的顽强拼搏,成功地保住了大江大河大湖干堤的安全,保住了重要城市的安全。保住了重要铁路干线的安全,保住了人民生命的安全。
