Help


[permalink] [id link]
+
Page "Application binary interface" ¶ 5
from Wikipedia
Edit
Promote Demote Fragment Fix

Some Related Sentences

case and complete
Participation for the educator in this case, however, would have to be raised to full and complete membership.
Another less ambiguous case read as follows: `` The bearer of this letter has served me for two years to his complete satisfaction.
As `` a matter of fact no such complete solution of the dream has ever been accomplished in any case,, and what is more, every one attempting such solution has found that in most cases there have remained a great many components of the dream the source of which he has been unable to explain nor is the discussion closed on the subject of the mantic or prophetic power of dreams ''.
When they were forced to, Central Worlds shrugged its shoulders, arranged a tour of the Laboratory Schools and set the tour off to a big start by showing the members case histories, complete with photographs.
The best presentation of the case for Ambrose is by P. A. Ballerini in his complete edition of that father's works.
In this case, is the smallest σ-algebra that contains the open intervals of R. While there are many Borel measures μ, the choice of Borel measure which assigns for every interval is sometimes called " the " Borel measure on R. In practice, even " the " Borel measure is not the most useful measure defined on the σ-algebra of Borel sets ; indeed, the Lebesgue measure is an extension of " the " Borel measure which possesses the crucial property that it is a complete measure ( unlike the Borel measure ).
Nonetheless, as a practical matter, no civil law legislature can ever address the full spectrum of factual possibilities in the breadth, depth and detail of the case law of the common law courts of even a smaller jurisdiction, and that deeper, more complete body of law provides additional predictability that promotes commerce.
This is a frequent occurrence in sitcoms, where networks may agree to continue a show, but only if a certain character is emphasized, leading other minor characters to become victims of Chuck Cunningham Syndrome, while the emphasized character ( usually a Breakout Character ) ( as in the case of Frasier Crane ) develops a more complete back story that ignores previous, more simplified back stories.
Villages were bombarded to complete annihilation like in the case of Tretyaki, Novokhopersk uyezd, Voronezh Governorate.
These were the key discoveries that made all non-live or non live-on-videotape narrative motion pictures and television possible — that shots ( in this case whole scenes since each shot is a complete scene ) can be photographed at widely different locations over a period of time ( hours, days or even months ) and combined into a narrative whole.
" Adam Sisman, in 2006, questioned the nature of the poem itself: " No one even knows whether it is complete ; Coleridge describes it as a ' fragment ,' but there is a case for doubting this.
If the structures of the two metals are the same, there can even be complete solid solubility, as in the case of electrum, the alloys of silver and gold.
In the case of seL4, complete formal verification of the implementation has been achieved, i. e. a mathematical proof that the kernel's implementation is consistent with its formal specification.
The reference form ( more technically, the least marked ) of certain parts of speech is normally in the nominative case, but this is often not a complete specification of the reference form, as it may also be necessary to specify such as the number and gender.
However, nuclear reactors are still capable of causing smaller explosions even after complete shutdown, such as was the case of the Fukushima Daiichi nuclear disaster.
In draw poker played for high and pai gow poker, the bug is considered to be an ace, unless it can be used as a missing card to complete a straight or a flush, in which case it becomes the highest card which can complete the hand.
A two-or three-level offense level reduction is usually available for those who accept responsibility by not holding the prosecution to the burden of proving its case ; this usually amounts to a complete sentence reduction.
A malicious ( or erroneous ) revocation of some ( or all ) of the keys in the system is likely, or in the second case, certain, to cause a complete failure of the system.
In such cases, requestors asking for a Purple Heart ( especially from records of the First World War ) are provided with a complete copy of all available records ( or reconstructed records in the case of the 1973 fire ) and advised that the Purple Heart may be privately purchased if the requestor feels it is warranted.
In the case of human populations, such a complete list is unlikely to exist, but such complete samples are often available in other disciplines, such as complete magnitude-limited samples of astronomical objects.
Source code also appears in books and other media ; often in the form of small code snippets, but occasionally complete code bases ; a well-known case is the source code of PGP.
In the simplest case, a switch has two conductive pieces, often metal, called contacts, connected to an external circuit, that touch to complete ( make ) the circuit, and separate to open ( break ) the circuit.

case and operating
The same restrictions apply after local sunset in the case of class 3, stations operating on regional channels, which after that time are required to operate under nighttime restrictions in order to protect each other.
In this case the stage R operating with conditions Af transforms the state of the stream from Af to Af, but only the probability distribution of Af is known.
And this is true in the case of some turnpikes on which revenues have risen close to, or beyond, the point at which the roads start to pay all operating costs plus annual interest on the bonds.
Each individual test, known as a case, exercises a particular operating condition of the user's environment or feature of the system, and will result in a pass or fail, or boolean, outcome.
Mature versions of the Commodore, SWTPC, Atari and Apple home computer systems all featured a disk operating system ( actually called ' DOS ' in the case of the Commodore 64 ( CBM DOS ), Atari 800 ( Atari DOS ), and Apple II machines ( Apple DOS )), as did ( at the other end of the hardware spectrum, and much earlier ) IBM's System / 360, 370 and ( later ) 390 series of mainframes ( e. g., DOS / 360: Disk Operating System / 360 and DOS / VSE: Disk Operating System / Virtual Storage Extended ).
In this case, with perfect competition in the output market the long-run equilibrium will involve all firms operating at the minimum point of their long-run average cost curves ( i. e., at the borderline between economies and diseconomies of scale ).
The issue central to the case was whether Microsoft was allowed to bundle its flagship Internet Explorer ( IE ) web browser software with its Microsoft Windows operating system.
The case also asserts further that at the time of its dissolution in New York, FGU was current on all obligations with that state and in good standing which then devolved into the entity currently operating simply as Fantasy Games Unlimited.
The NS32532 was the basis of one of the few fully realized " public domain " hardware projects ( that is, resulting in an actual, useful machine running a real operating system, in this case Minix or NetBSD ), the PC532.
The first method, called a " gas piston ," uses the high pressure gas ported from the barrel to drive an enclosed piston back against an operating rod or linkage ( they are often one piece ), which in turn unlocks the bolt and drives it rearward, ejecting the spent case and cocking the hammer or striker spring.
In telecommunication, a bridge-to-bridge station is a ship station operating in the port operations service in which messages are restricted to navigational communications and which is capable of operation from the ship's navigational bridge or, in the case of a dredge, from its main control station, operating on a frequency or frequencies in the 156-162 MHz band.
In the case of a rail line in the U. S., the owner of the property is said to retain a " residual common carrier obligation ", unless otherwise transferred ( such as in the case of a commuter rail system, where the authority operating passenger trains may acquire the property but not this obligation from the former owner ), and must operate the line if service is terminated.
Many lasers emit beams that approximate a Gaussian profile, in which case the laser is said to be operating on the fundamental transverse mode, or " TEM < sub > 00 </ sub > mode " of the laser's optical resonator.
In March 2004, the European Commission in the European Union Microsoft antitrust case fined Microsoft € 497 million and ordered the company to provide a version of Windows without Windows Media Player, claiming Microsoft " broke European Union competition law by leveraging its near monopoly in the market for PC operating systems onto the markets for work group server operating systems and for media players ".
This can be particularly useful for large enterprises whose operating systems are based on Linux and other Unix-like systems, typically consisting of hundreds or even thousands of distinct software packages ; in the former case, a package management system is a convenience, in the latter case it becomes essential.
Additional addresses ( say, 10. 0. 0. 230-10. 0. 0. 240 ) are aliased to the loopback interface of the server ( or assigned to special interfaces, the latter typically being the case with VMware / UML / jails / vservers / other virtual server environments ) and ' published ' on the 10. 0. 0. 2 interface ( although many operating systems allow direct allocation of multiple addresses to one interface, thus eliminating the need for such tricks ).
In such a case, the company may be deriving additional operating cash by issuing shares or raising additional debt finance.
A firewall can be defined as a way of filtering network data between a host or a network and another network, such as the Internet, and can be implemented as software running on the machine, hooking into the network stack ( or, in the case of most UNIX-based operating systems such as Linux, built into the operating system kernel ) to provide realtime filtering and blocking.
In the case of full disk encryption applications, especially when implemented without a boot PIN, a cryptoprocessor would not be secure against a cold boot attack if data remanence could be exploited to dump memory contents after the operating system has retrieved the cryptographic keys from its TPM.

0.378 seconds.