bytes used

英 [baɪts juːzd] 美 [baɪts juːzd]

网络  已使用字节

计算机



双语例句

  1. The number of bytes used as a pointer is 3 bytes.
    用作指针的字节数是3个字节。
  2. In contrast, the approach of only storing modified spans of bytes rather than complete blocks is called logical journaling, and is the approach used by XFS.
    相反,只存储已修改的字节范围而非完整块的方法称为逻辑日志记录,这是XFS所使用的方法。
  3. UTF-8:1 to4 bytes are used for the encoding of each character.
    UTF-8:使用1到4字节来表示每个字符的编码。
  4. The new data type, the bytes literal, as well as the bytes object are used for storing binary data.
    新的数据类型bytesliteral及bytes对象的用途是存储二进制数据。
  5. A schema name can be up to30 bytes long and is used as the high order part of a two-part object name.
    模式名的最大长度为30字节,它用作分两部分的对象名的第一部分。
  6. This setting is the size in bytes ( the default is320000) of the data buffer used by the messaging engine for the best effort, non-persistent reliability level.
    在该设置中,消息引擎对besteffort和non-persistentreliability两个质量级别的数据缓冲区使用字节为单位(默认值为320000)。
  7. Info: Show a summary of the number of keys and bytes used by the database.
    info:显示数据库使用的键和字节数的概要。
  8. 2 bytes of source port ( in other words, the port on source that the packet used)
    个字节的源端口(换句话说,即数据包所使用的源地址上的端口)
  9. Finally, the loaded class bytes are used to define a class to the JVM, with a reference pointer being maintained to the associated ProtectionDomain.
    最后,用装载的类字节向JVM定义一个类,并在关联的ProtectionDomain中维护一个引用指针。
  10. To calculate the memory used, we subtracted the total amount of memory available on the system from the memory object, Available Bytes Counter.
    要计算使用的内存,我们从内存对象AvailableBytesCounter中减去系统中可用的总内存量。
  11. In this sample, only four bytes of the command are used.
    本例只用了命令的四个字节。
  12. However, in the case of a multi-byte encoding, the length of the character in bytes varies according to the encoding used, and each character can be one or more bytes in length.
    但是对于多字节编码,字符的字节长度随使用编码模式的不同而不同,每个字符的长度可能是一个字节或多个字节。
  13. HTTP bytes data binding: Used to receive bytes
    HTTP字节数据绑定:用于接收字节
  14. Java imposes considerable red-tape overhead in the size of each object ( up to32 bytes, depending on the Java VM used).
    Java强行在每个对象的大小方面增加了相当大的开销(多达32个字节,取决于所使用的JavaVM)。
  15. Since a32-bit DWORD has4 bytes, that leaves one extra byte by my count ( 4-3= 1). The extra byte is often used as the "alpha channel," used to specify the pixel's transparency.
    由于32位的DWORD有4个字节,多余的这个字节常被用作“alphachannel”,用于指定像素的透明度。
  16. The bytes from "key_block" are used to populate the following
    “keyblock”被用来提取以下密钥
  17. If the understanding of the extra bytes is needed, the reserved codes shall be used in the earlier fields to obtain it.
    若需要对额外字节的理解,则通过在较早的域中使用预留编码获得它。
  18. Enough disk space for the database should be allocated to accommodate the14 bytes per database row if any of the row versioning features is used.
    如果使用任何一种行版本控制功能,则应该为数据库分配足够的磁盘空间以允许每个数据库行使用14个字节。
  19. Current number of bytes used by the aggregation cache.
    累积高速缓存使用的当前字节数。
  20. This is followed by a lot of "FF" bytes that are used to pad the result to make sure that it's big enough.
    后面是一大堆“FF”,用他们填充这个结果,使之足够大。
  21. The problem is that there will be many bytes which are never used.
    问题是其中有不少位组空闲用。
  22. Since the largest multi-byte character used in Windows is two bytes long, the term double-byte character set, or DBCS, is commonly used in place of MBCS.
    由于Windows里使用的多字节字符绝大部分是两个字节长,所以MBCS常被用DBCS代替。
  23. Maximum number of bytes used for user-mode file cache ( since service startup).
    用户模式文件缓存使用的最大字节数(自服务启动后)。
  24. The abundant spending bytes in SDH frame structure can be used as the management information carrier and the network management private transmission channel, it can greatly improve the management and maintenance ability in SDH operation.
    SDH帧结构中丰富的开销字节,可作为管理信息的传输载体和网管专用的传输通道,大大地提高SDH的运行管理维护能力。
  25. Elliptic curve cryptosystem has many advantages, such as less bytes and difficult to decode, so it is widely used in public key system, and it has been a research hotspot in the area of public key system.
    椭圆曲线密码体制因其长度小、限免难度高等特点在公钥密码系统中逐渐得到广泛应用,目前它已成为公钥密码体制中的研究热点。