快好知 kuaihz


computer programs造句
31. Pertaining to computer programs or data while they remain on a particular storage device. 32. Syllabus of Building Programming Experience:A Lead-In to Structure and Interpretation of Computer Programs. 33. Many groups offer usable computer programs. The ones under comp. 34. Description Course Pedagogy of Building Programming Experience:A Lead-In to Structure and Interpretation of Computer Programs. 35. The WMAP team used computer programs to find the proportion of wave sizes generating the sound spectrum, just as a prism converts light wavelengths to color. 36. The calculation can be performed with standard transfer matrix technique computer programs. The procedure provided here can avoid the calculation difficulty met in the procedure of some literatures. 37. Most computer programs introduce or delete the dependent variables in a stepwise manner. 38. Most computer programs are protected not only by copyright but also by a software license. 39. Contrastive simulation research on heat - transfer factor, friction factor and fin structure of offset strip fin heat exchanger affect heat - transfer property by compiling computer programs. 40. Some standard symbols, which are frequently required for flowcharting many computer programs are shown in Fig. 41. Considering the current sad state of our computer programs, software development is clearly still a black art, and cannot yet be called an engineering discipline. "- Bill Clinton". 42. A software methodology is the set of rules and practices used to create computer programs. 43. Spreadsheet applications are computer programs that let you create and manipulate spreadsheets. 44. Specialised computer programs and experienced technicians are needed to grade the images—retinal vessel calibre cannot be reliably estimated in clinical practice using direct ophthalmoscopy . 45. The method of measuring water potential of plants with thermocouple psychrometer and the flow chart of computer programs for automatic measurement are presented in this paper. 46. Computer programs are employed to simulate the relational network constructed in the second step and test whether it is workable. 47. Trojan Horse Programs are a type of malicious computer programs. 48. The chess-playing computer programs think of moves, think of strategies no one's thought of before.