Examples of using Hard-coded in English and their translations into Indonesian
{-}
-
Colloquial
-
Ecclesiastic
-
Computer
-
Ecclesiastic
All parameters were changed with hard-coded values.
The random number generator is hard-coded software package instructions that do not change.
The backdoor periodically sendsDNS queries to one of a series of domains hard-coded in its source code.
Each NIC is assigned a unique hard-coded MAC addresses that cannot be changed.
You may also see another type of lookup field, called a value list,that uses a hard-coded list of choices.
The random number generator is hard-coded program directions that do not change.
Often these layouts are produced using relative units like percents, ems,or rems instead of hard-coded pixel values.
Each NIC is allocated a distinctive hard-coded Mac pc addresses that can't be changed.
In addition you can add static IPv4<->IPv6 mappings for applications which use hard-coded IPv4 addresses.
The particular random number generator is hard-coded software instructions that do not alter.
Hard-coded algorithms or fixed, rule-based systems just didn't work very well for things like image recognition or extracting meaning from text.
Embedded SQL is SQL statements are hard-coded in the program and executed"as-is" at run-time.
A hard-coded limit in Bitcoin software- 1 megabyte per blockchain block- prevents the network from processing more than about a dozen transactions per second.
Another use of this method is the possibility of hard-coded authentication information in the servlet's login page simply creating the appropriate link.
The trouble with piling all the calculations into a formula is that you can't easily see what numbers go where,or what numbers are user inputs or hard-coded.
Unfortunately, the only characters who carry overbetween scenarios are the heroes--hard-coded characters scripted to appear at certain times.
If the problem occurs when a certain method for a certain control gets called, then try to only include this control in the empty application andcall that method with hard-coded values.
Moreover, the software uses an olderencryption method with a single secret key hard-coded in the software, rather than asymmetrical encryption that offers better security by design.
As a former discretionary trader, it took some time getting used to this,but that's the beauty of running quantitative models- hard-coded discipline and no emotion.
The FBI alert notes that the hard-coded string does not affect the new attack script, but can be used as signatures for intrusion detection and intrusion prevention devices to detect and block attacks from the Brobot botnet.
Oracle has not released complete details of the vulnerability in an effort to prevent exploitation in the wild,but here the"default account" could be a secret account with hard-coded or no password.
They comment on the implications:“Human musicality fundamentallyrests on a small number of fixed pillars: hard-coded predispositions, afforded to us by the ancient physiological infrastructure of our shared biology.
The benefit here is that you can be sure that the recommendations are going to represent the actual habits and preferences of your users,and are not displayed based on arbitrary, hard-coded criteria.
Dubbed Linux/IRCTelnet, the nasty malware is written in C++ and, just like Mirai malware,relies on default hard-coded passwords in an effort to infect vulnerable Linux-based IoT devices.
WannaCry uses three hard-coded bitcoin addresses to gather ransom payments, and that is likely to make it challenging to work out who has paid, assuming the gang behind it does intend to restore locked files.
The original Half-Life engine based on the GoldSrc engine, lacked such physics,with certain events or situations instead hard-coded as animations, such as a toppling stack of boxes.
When a game contains hard-coded logic or game rules, or employs special-case code to render specific types of game objects, it becomes difficult or impossible to reuse that software to make a different game.
After all, intentional or unintentional backdoor-like vulnerabilities--such as hidden administrative accounts with hard-coded, static passwords-- are frequently found in networking products from a variety of vendors, and some of them are likely used by government agencies.
When a game contains hard-coded reasoning or game guidelines, or uses special-case code to render specific types of game objects, it comes to be difficult or impossible to recycle that software to make a different video game.