首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 156 毫秒
1.
用Python语言来编写多线程代码可以使代码的运行效率大大提高,以便更好的利用计算机的资源.但是Python多线程代码在运行的过程中有着不确定性会导致很难发现代码中的潜在错误,影响到代码的正确性和健壮性.本文利用Petri网对一个Python多线程程序建立模型,并且通过对该模型的结构和行为进行分析从而对程序中的错误来进行定位,然后分析引发错误的原因并给出其解决的方案.  相似文献   

2.
目的采用DRM范式探讨不同关联方式和学习程度对错误记忆的影响。方法实验以中文字词为材料,将词语和相应词表的关键项目之间的关联方式分为语义关联、语音关联、字形关联三种,对三种不同关联的材料进行三次或者一次学习并统计各关联方式词语在不同程度学习中的错误再认率。结果 (1)三种关联方式对错误记忆的影响都很显著,其中字形关联的错误记忆效应明显大于语义关联、语音关联;(2)学习程度的提高能降低对关键项目的错误再认率;(3)在两种不同学习程度下的各种关联方式的错误再认率之间不存在明显差异。结论学习程度和关联方式都能明显的引发错误记忆。  相似文献   

3.
潜伏在网页代码里的Applet恶意代码程序具有很大的隐蔽性与破坏性,它能够通过IE(Internet Explorer)自身的一些漏洞对IE进行修改或破坏,文中讨论了针对这些修改或破坏用户可采取的一些预防措施及修复方法.  相似文献   

4.
编写程序,代码就可能包含错误,本文就VBA代码中错误捕获的重要性和捕 获代码错误的方法作一些探讨.  相似文献   

5.
VBA代码中的错误捕获   总被引:1,自引:0,他引:1  
编写程序,代码就可能包含错误,本就VBA代码中错误捕获的重要和捕获代码错误的方法作一些探讨。  相似文献   

6.
孟建安 《天中学刊》2000,15(3):120-122
编辑对稿件语言的修改与重建工作,因种种原因存在着不少问题,致使稿件依然有错误的或不恰当的语言现象。正因为如此,编辑应该坚持一定的原则并综合运用不同的手段去修改与重建语言,以使稿件语言更趋规范,从而更好地表情达意。  相似文献   

7.
这册语文、算术教材是一九六三年八月编辑出版的,前名为民办小学课本。一九六四年春,曾经作过一次修改。为了使教材更好地为阶级斗争、生产斗争、科学实验三大革命运动服务,更好地贯彻党的教育方针,为普及农村教育服务,更加符合农村多种形式耕读小学教学的实际需要,我们在今年春季对这两本教材进行了全面的修改,并且更名为农村小学课本语文、算术第一册。这次修改,虽然作了一些努力,但限于水平、缺点和错误可能还有很多,我们希望广大教育工作者多多提出批评和意见,以便进一步修改。现将语文、算术第一册改编情况分别说明如下。  相似文献   

8.
慧眼识病句     
小朋友们,中华民族有着五千年的文明史,你们要想了解祖国博大精深的文化,就必须学好祖国的语言文字。因此,我们特意设置了“字斟句酌”这个栏目,对常见的词句错误进行归纳总结,并提供修改方案,帮助小朋友们更好地学习,更好地写作,希望小朋友们多多关注我们的新栏目哦!  相似文献   

9.
在提取诱发遗忘范式下探讨提取类型在不同关联方式下对错误记忆的影响。实验采用3(提取类型)×3(关联方式)的两因素被试内实验设计,结果表明,练习项目的错误再认率低于基线项目和未练习项目的错误再认率,未练习项目的错误再认率高于基线项目的错误再认率;关联方式主效应不显著;提取类型和关联方式的交互作用显著,在练习项目下,字形关联的错误再认率显著高于语义关联和语音关联的错误再认率,未练习项目下各关联方式的错误再认率差异不显著,在基线项目下,语义关联的错误再认率比语音关联和字形关联的错误再认率大。结论:提取练习可以显著降低项目的错误再认率。  相似文献   

10.
假定英语课上老师要求同桌之间交换修改作文,请修改你同桌写的以下作文。文中共有10处语言错误,每句中最多有两处。毎处错误仅涉及一个单词的增加、删除或修改。増加:在缺词处加一个漏字符号(∧),并在其下面写出该加的词。删除:把多余的词用斜线(\)划掉。修改:在错的词下画一横线,并在该词下面写出修改后的词。注意:1.每处错误及其修改均仅限一词;2.只允许修改10处,多者(从第11处起)不计分。  相似文献   

11.
A significant portion of tutorial interactions revolve around the bugs a student makes. When a tutor performs an intervention to help a student fix a programming bug, the problem of deciding how to help the student appears to require extensive planning. In this article, we identify five considerations tutors appear to take into account when they plan tutorial interventions for students’ bugs. Using data collected from human tutors working in the domain of introductory computer programming, we (1) identify the knowledge tutors use when they reason about the five planning considerations, and (2) show that tutors are consistent in the ways that they use the kinds of knowledge to reason about students’ bugs.  相似文献   

12.
MATLAB在教学与科研中给使用者所带来的便利是不言而喻,但其中的一些漏洞(小BUG)却给使用者带来了困惑和隐忧。本文就MATLAB中的运算优先级漏洞进行探讨,提示使用者如何避免由于MATLAB的漏洞所发生的错误,也提醒使用者注意判别MATLAB给出的结果是否真实可靠。  相似文献   

13.
通过两个测试方案测试出Dephi6在数据处理中的两个Bug :一个在行集处理方面 ,另一个在投影方面 ,并在以SQLSERVER为后台数据库的背景下给出相应的解决方案  相似文献   

14.
Students first learning to program in any procedural language face the often difficult task of translating solution processes, which they are familiar with, into a form that is bug‐free from a computer standpoint. One element of the differences between the novice and the expert programmer is that the expert already has a set of mappings that allow him or her to translate common solution patterns. This article examines some of the most basic patterns and suggests that students be taught how to recognize them and translate them into code. It is argued that the patterns and the code requirements are similar across a whole range of imperative languages including C, Pascal, Basic, and Cobol.  相似文献   

15.
This article describes an empirical investigation of the extent to which incorrect arithmetic algorithms persist over time. The use of subtraction procedures by children aged 9–11 was charted over time periods of 1–3 months. The ways in which several bugs might be related to a single misconception were considered and a set of “bug classes” was identified. The results indicated that the prevailing tendency to attribute stable procedural knowledge and systematic behavior to children of this age is misguided. They provide some insight into the development of mathematical knowledge under the influence of conventional instruction.  相似文献   

16.
随着数据库的日益普及,现在的BBS和电子商务网站一般都采用ASP+SQL来设计,因而ASP+SQL被攻击的成功率也比较高,漏洞的存在成了不可避免的问题.本文通过实践总结了一些SQL Server 2000新的Bug和加强数据库安全的方法,以达到预防和尽量避免漏洞产生的目的.  相似文献   

17.
Abstract

Tracing solutions to programming problems is a long‐standing technique used to reveal the details of a solution and to expose bugs in a program. Tracing can also help programmers build a model or representation of how a programming language responds to code. This article describes the LISP Evaluation Modeler (LEM), an on‐line tracing tool designed to (a) help novices form an understanding of and facility with the LISP evaluation process, and (b) assist all programmers in designing and debugging programs. An empirical study of LEM demonstrates its advantages for design, comprehension, and debugging and suggests ways in which LEM can help novices learning LISP.  相似文献   

18.
This paper compares Bourdieu's notion of habitus with Bernstein's concept of code in an attempt to show how the apparent similarities mask more deeply seated differences in the way the concepts are conceived and used. We argue that Bernstein is following an essentially structuralist agenda of the kind that Bourdieu has set himself against. To this end, Bourdieu seeks to overcome the rigidities of ‘rules’ (which lie at the heart of the idea of Bernstein's code), with the more flexible notion of ‘strategy’ which incorporates the idea that structure and agency are implicit in each other rather than being dichotomous entities.  相似文献   

19.
随着生源的逐年递减,高校逐渐从"卖家"转变为"买家",在招生宣传中采取各种方式吸引考生。本文探究作为招生宣传最直观方式的校园开放日的重要性、现状及如何有效开展。  相似文献   

20.
This paper describes an approach to the debugging of student Prolog programs in a Prolog Intelligent Tutoring System (PITS) that detects errors in them and proposes the corrections necessary to fix them. It proposes the use of multiple sources of expertise to analyse Prolog programs for tutoring purposes, and the collaboration of these sources for understanding student programs, detection of bugs and suggesting fixes to buggy student programs. It also demonstrates the use of a heuristic bestfirst search of the program decomposition space to parse a Prolog program into a hierarchical structure of predicate definitions, clauses, subgoals, arguments and terms. This article illustrates the merits of an algorithm-based approach supplemented by multiple sources of expertise for program debugging by showing that APROPOS2 is an effective, realistic and useful tool for program debugging. It then highlights the difficulties inherent in debugging Prolog programs and discusses the limitations of our algorithm-based approach.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号