• Note that such stale pointer accesses do not always result in access violations.

    请注意这种陈旧指针访问并不总是访问冲突结果

    youdao

  • Audit logs for events such as access violations can also be managed by the security server.

    事件(比如违规访问)审计日志可以安全服务器管理

    youdao

  • Audit logs, for things such as access violations, are sent to the security server by default.

    默认情况下,审计日志(比如违规访问)发送安全服务器

    youdao

  • Metrics, reports, and queries can be used to assess the state of the models, as well as to track access violations.

    可以使用工具报告查询评价模型状态追踪访问入侵情况

    youdao

  • In programs consisting entirely of verifiable managed code, all references are either valid or null, and access violations are impossible.

    完全可验证托管代码组成的程序中,所有引用有效或者为空,因而不会产生访问冲突

    youdao

  • Because the compiler allocates constant strings in a static read-only memory, any attempts to modify it cause access violations and random crashes.

    因为编译静态只读内存中分配常数字符串,所以,尝试修改内存会导致访问冲突随机崩溃。

    youdao

  • On C or C++ projects, we always made it mandatory to run Purify on components to prevent memory access violations from making their way into production code.

    C或者 C++项目中我们已经强制组件运行Purify预防进入产品代码内存访问违规

    youdao

  • In some unusual cases, it is also possible for access violations or similar problems to be triggered in DLLs which are called before they have been initialized.

    某些特殊情况下可能在未初始化就调用的DLL触发访问冲突类似问题

    youdao

  • Thus, management retains control over who can access each specific set of models, which prevents potential security violations.

    因此管理保留了访问模型特定集合控制权就阻止了潜在安全性入侵

    youdao

  • Little information was available on formal criminal justice procedures and practices, and outside access to the legal system was limited to trials for traffic violations and other minor offenses.

    ——译者进行惩治。正式刑事司法程序实践可以获知的信息非常外界法律系统的了解仅限于违反交通规则和其他轻罪审判

    youdao

  • There may be violations logging processes for investigation of any unauthorized attempt to access information.

    公司可能设有记录违反事项程序,以便调查未经授权试图取用资料的行为。

    youdao

  • There may be violations logging processes for investigation of any unauthorized attempt to access information.

    公司可能设有记录违反事项程序,以便调查未经授权试图取用资料的行为。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定