代码搜索:execute

找到约 10,000 项符合「execute」的源代码

代码结果 10,000
www.eeworm.com/read/240529/4573090

java oncommand.java

package com.javapatterns.command.television; public class OnCommand implements Command { private Tv myTv; public OnCommand (Tv tv) { myTv = tv; } public void execute( ) {
www.eeworm.com/read/240529/4573094

java offcommand.java

package com.javapatterns.command.television; public class OffCommand implements Command { private Tv myTv; public OffCommand (Tv tv) { myTv = tv; } public void execute()
www.eeworm.com/read/240162/4587953

x 920501-7.x

# This doesn't work on sparc's with -mflat. if { [istarget "sparc-*-*"] && [string match "*mflat*" $CFLAGS] } { set torture_execute_xfail "sparc-*-*" } return 0
www.eeworm.com/read/240162/4588339

x 941014-1.x

# This doesn't always work for Thumb. if { [istarget arm*-*-*] || [istarget xscale*-*-*] \ || [istarget strongarm*-*-*] } { set torture_eval_before_execute { global compiler_conditional_xf
www.eeworm.com/read/240162/4588518

x 920428-2.x

# This doesn't work on sparc's with -mflat. if { [istarget "sparc-*-*"] && [string match "*mflat*" $CFLAGS] } { set torture_execute_xfail "sparc-*-*" } return 0
www.eeworm.com/read/239312/4602609

permx

#!/bin/sh # Scriptname:permx for file # Empty wordlist do if [ -f $file -a ! -x $file ] then chmod +x $file echo $file now has execute permission fi done
www.eeworm.com/read/237597/4622274

cs reflect2.cs

// Reflect2.cs -- Uses reflection to execute a class method indirectly. // // Compile this program with the following command line: // C:>csc Reflect2.cs // usin