Examples of using Executable code in English and their translations into Vietnamese
{-}
-
Colloquial
-
Ecclesiastic
-
Computer
Class definitions are executable code.
MBR also contains executable code which can scan the partitions for the active operating system and load up the operating system.
Colin Percival, Naive differences of executable code, WEB 2003.↩.
Background compilation does not generate executable code, since it requires a different compiler than the one used to generate executable code.
A user composes each Docker image to include system libraries, tools,and other files and dependencies for the executable code.
BIN files may contain both executable code and data required to start a program and may be created for Mac, Windows, or Unix platforms.
Sometimes, however, even this has been lost andthe reverse engineering must start with the executable code.
For years, SQL injections, where executable code was forced inside of a SQL database entry field, were one of the scourges of the internet.
A virus is a self-replicating program that produces itsown code by attaching copies of it onto other executable codes.
When a program runs, the kernel first sets aside some memory,then loads the executable code from the filesystem into it, and then starts the code running.
Communication of the Source Code The Licensor may provide theWork either in its Source Code form, or as Executable Code.
NET Framework compiles the Common Intermediate Language code into executable code using its“Just-in-time” compiler, and stores the executable program into the. NET Native Image Cache.
While most of these are related to text only, a growing number are integrating text with images,data, and executable code.
At the lowest programming level,[clarification needed] executable code consists of machine language instructions supported by an individual processor- typically a central processing unit(CPU) or a graphics processing unit(GPU).
A Dynamic Link Library(DLL) is a file of code containingfunctions that can be called from other executable code(either an application or another DLL).
Two programmers named Basit and Amjad replace the executable code in the boot sector of a floppy disk with their owncode designed to infect each 360kb floppy accessed on any drive.
The insertion of the virus into a program is named infection,and the infected file, or executable code that is not a part of a file is called a host.
Compiled computer programs are commonly referred to as executables, binary images, or simply as binaries-a reference to the binary file format used to store the executable code.
Some Japanese users referred to this as a omamori(charm) left by Iwata himself.[161]With the 4.0 update, the executable code for this Easter egg appears to have been wiped by Nintendo.[162].
In computing, executable code or an executable file or executable program, sometimes simply referred to as an executable, causes a computer"to perform indicated tasks according to encoded instructions",[1] as opposed to a data file that must be parsed by a program to be meaningful.
In computer security, a computer virus is a self-replicating computerprogram that spreads by inserting copies of itself into other executable code or documents.
Educational apps designed to teach, develop,or allow students to test executable code may, in limited circumstances, download code provided that such code is not used for other purposes.
The No-Execute bit or NX bit(bit 63 of the page table entry) allows the operating system to specify which pages ofvirtual address space can contain executable code and which cannot.
Apple replaced it with"Educational apps designed to teach, develop,or allow students to test executable code may, in limited circumstances, download code provided that such code is not used for other purposes.
Though the major Linux distributors such as Red Hat, Debian and Ubuntu, have already updated their software against the flaw, GHOST could be used by hackers against only ahandful of applications currently to remotely run executable code and silently gain control of a Linux server.
Unlike many computer languages, a Java compiler doesn't translate correct source code(based on a language specification's syntax and semantics)to equivalent executable code that runs directly on Microsoft Windows/Intel, Sun Solaris/SPARC, or another platform(an operating system and hardware architecture combination).
True MDA support ensures that truly Platform Independent Models(PIM) can be created,and Platform Specific Model(PSM) and executable codes can be automatically generated in any way.
Broadening the similarity, the insertion of a virus into the program is known as an"infection",and the infected file, or executable code that is not part of a file, is called a"host".