英文字典中文字典Word104.com



中文字典辭典   英文字典 a   b   c   d   e   f   g   h   i   j   k   l   m   n   o   p   q   r   s   t   u   v   w   x   y   z   







請輸入英文單字,中文詞皆可:

vaxocentrism    
/vak"soh-sen"trizm/ [analogy with "ethnocentrism"] A notional
disease said to afflict C programmers who persist in coding
according to certain assumptions that are valid (especially
under Unix) on {VAXen} but false elsewhere. Among these are:

1. The assumption that dereferencing a null pointer is safe
because it is all bits 0, and location 0 is readable and 0.
Problem: this may instead cause an illegal-address trap on
non-VAXen, and even on VAXen under OSes other than BSD Unix.
Usually this is an implicit assumption of sloppy code
(forgetting to check the pointer before using it), rather than
deliberate exploitation of a misfeature.

2. The assumption that characters are signed.

3. The assumption that a pointer to any one type can freely be
cast into a pointer to any other type. A stronger form of
this is the assumption that all pointers are the same size and
format, which means you don't have to worry about getting the
casts or types correct in calls. Problem: this fails on
word-oriented machines or others with multiple pointer
formats.

4. The assumption that the parameters of a routine are stored
in memory, on a stack, contiguously, and in strictly ascending
or descending order. Problem: this fails on many RISC
architectures.

5. The assumption that pointer and integer types are the same
size, and that pointers can be stuffed into integer variables
(and vice-versa) and drawn back out without being truncated or
mangled. Problem: this fails on segmented architectures or
word-oriented machines with funny pointer formats.

6. The assumption that a data type of any size may begin at
any byte address in memory (for example, that you can freely
construct and dereference a pointer to a word- or
greater-sized object at an odd char address). Problem: this
fails on many (especially RISC) architectures better optimised
for {HLL} execution speed, and can cause an illegal address
fault or bus error.

7. The (related) assumption that there is no padding at the
end of types and that in an array you can thus step right from
the last byte of a previous component to the first byte of the
next one. This is not only machine- but compiler-dependent.

8. The assumption that memory address space is globally flat
and that the array reference "foo[-1]" is necessarily valid.
Problem: this fails at 0, or other places on segment-addressed
machines like Intel chips (yes, segmentation is universally
considered a {brain-damaged} way to design machines (see
{moby}), but that is a separate issue).

9. The assumption that objects can be arbitrarily large with
no special considerations. Problem: this fails on segmented
architectures and under non-virtual-addressing environments.

10. The assumption that the stack can be as large as memory.
Problem: this fails on segmented architectures or almost
anything else without virtual addressing and a paged stack.

11. The assumption that bits and addressable units within an
object are ordered in the same way and that this order is a
constant of nature. Problem: this fails on {big-endian}
machines.

12. The assumption that it is meaningful to compare pointers
to different objects not located within the same array, or to
objects of different types. Problem: the former fails on
segmented architectures, the latter on word-oriented machines
or others with multiple pointer formats.

13. The assumption that an "int" is 32 bits, or (nearly
equivalently) the assumption that "sizeof(int) ==
sizeof(long)". Problem: this fails on {PDP-11s}, {Intel
80286}-based systems and even on {Intel 80386} and {Motorola
68000} systems under some compilers.

14. The assumption that "argv[]" is writable. Problem: this
fails in many embedded-systems C environments and even under a
few flavours of Unix.

Note that a programmer can validly be accused of vaxocentrism
even if he or she has never seen a VAX. Some of these
assumptions (especially 2--5) were valid on the {PDP-11}, the
original {C} machine, and became endemic years before the VAX.
The terms "vaxocentricity" and "all-the-world"s-a-VAX
syndrome' have been used synonymously.

[{Jargon File}]

vaxocentrism: /vak`soh·sen´trizm/, n. [analogy withethnocentrism’] A notional disease said
to afflict C programmers who persist in coding according to certain
assumptions that are valid (esp. under Unix) on
VAXen but false elsewhere. Among these are:

  1. The assumption that dereferencing a null pointer is safe because it is all
    bits 0, and location 0 is readable and 0. Problem: this may instead cause an
    illegal-address trap on non-VAXen, and even on VAXen under OSes other than BSD
    Unix. Usually this is an implicit assumption of sloppy code (forgetting to
    check the pointer before using it), rather than deliberate exploitation of a
    misfeature.

  2. The assumption that characters are signed.

  3. The assumption that a pointer to any one type can freely be cast into a
    pointer to any other type. A stronger form of this is the assumption that all
    pointers are the same size and format, which means you don't have to worry
    about getting the casts or types correct in calls. Problem: this fails on
    word-oriented machines or others with multiple pointer formats.

  4. The assumption that the parameters of a routine are stored in memory, on a
    stack, contiguously, and in strictly ascending or descending order. Problem:
    this fails on many RISC architectures.

  5. The assumption that pointer and integer types are the same size, and that
    pointers can be stuffed into integer variables (and vice-versa) and drawn back
    out without being truncated or mangled. Problem: this fails on segmented
    architectures or word-oriented machines with funny pointer formats.

  6. The assumption that a data type of any size may begin at any byte address in
    memory (for example, that you can freely construct and dereference a pointer
    to a word- or greater-sized object at an odd char address). Problem: this
    fails on many (esp. RISC) architectures better optimized for
    HLL execution speed, and can cause an illegal address
    fault or bus error.

  7. The (related) assumption that there is no padding at the end of types and that
    in an array you can thus step right from the last byte of a previous component
    to the first byte of the next one. This is not only machine- but
    compiler-dependent.

  8. The assumption that memory address space is globally flat and that the array
    reference foo[-1] is necessarily valid.
    Problem: this fails at 0, or other places on segment-addressed machines like
    Intel chips (yes, segmentation is universally considered a
    brain-damaged way to design machines (see
    moby), but that is a separate issue).

  9. The assumption that objects can be arbitrarily large with no special
    considerations. Problem: this fails on segmented architectures and under
    non-virtual-addressing environments.

  10. The assumption that the stack can be as large as memory. Problem: this fails
    on segmented architectures or almost anything else without virtual addressing
    and a paged stack.

  11. The assumption that bits and addressable units within an object are ordered in
    the same way and that this order is a constant of nature. Problem: this fails
    on big-endian machines.

  12. The assumption that it is meaningful to compare pointers to different objects
    not located within the same array, or to objects of different types. Problem:
    the former fails on segmented architectures, the latter on word-oriented
    machines or others with multiple pointer formats.

  13. The assumption that an int is 32 bits, or (nearly equivalently)
    the assumption that sizeof(int) ==
    sizeof(long)
    . Problem: this fails on PDP-11s, 286-based systems and
    even on 386 and 68000 systems under some compilers (and on 64-bit systems like
    the Alpha, of course).

  14. The assumption that argv[] is
    writable. Problem: this fails in many embedded-systems C environments and even
    under a few flavors of Unix.
Note that a programmer can validly be accused of vaxocentrism even if
he or she has never seen a VAX. Some of these
assumptions (esp. 2--5) were valid on the PDP-11,
the original C machine, and became endemic years before the VAX. The terms
vaxocentricity and all-the-world's-a-VAX syndrome have been used
synonymously.

請選擇你想看的字典辭典:
單詞字典翻譯
vaxocentrism查看 vaxocentrism 在Google字典中的解釋Google英翻中〔查看〕
vaxocentrism查看 vaxocentrism 在Yahoo字典中的解釋Yahoo英翻中〔查看〕





安裝中文字典英文字典查詢工具!


中文字典英文字典工具:
選擇顏色:
輸入中英文單字

































































英文字典中文字典相關資料:
  • Facts and Case Summary - Miranda v. Arizona - United States Courts
    In this case, the Supreme Court was asked to decide if the age of a juvenile being questioned by police should be taken into consideration when deciding if he or she is in police custody and, therefore, entitled to a Miranda warning
  • 1966: Miranda v. Arizona - A Latinx Resource Guide: Civil Rights Cases . . .
    In a 5-4 Supreme Court decision Miranda v Arizona (1966) ruled that an arrested individual is entitled to rights against self-incrimination and to an attorney under the 5th and 6th Amendments of the United States Constitution
  • Miranda v. Arizona - Wikipedia
    Because of the defendant's low I Q and poor English-language skills, the U S Court of Appeals ruled that it was a "clear error" when the district court found that Garibay had "knowingly and intelligently waived his Miranda rights "
  • Miranda v. Arizona | Definition, Background, Facts | Britannica
    Arizona reversed an Arizona court’s conviction of Ernesto Miranda on charges of kidnapping and rape
  • Miranda v. Arizona | Constitution Center
    Miranda’s oral and written confessions are now held inadmissible under the Court’s new rules One is entitled to feel astonished that the Constitution can be read to produce this result
  • Miranda v. Arizona, 384 U. S. 436 (1966) - Justia U. S. Supreme Court Center
    Miranda v Arizona: Under the Fifth Amendment, any statements that a defendant in custody makes during an interrogation are admissible as evidence at a criminal trial only if law enforcement told the defendant of the right to remain silent and the right to speak with an attorney before the interrogation started, and the rights were either exercised or waived in a knowing, voluntary, and
  • Miranda v. Arizona: The Landmark Decision on Suspect Rights
    Understand the Supreme Court's pivotal 1966 decision that codified the protection against self-incrimination during all police custody The 1966 Supreme Court decision in Miranda v Arizona established a procedural requirement to protect the rights of criminal suspects during police questioning
  • Miranda v. Arizona Case Summary: What You Need to Know
    This list of rights, known as the “Miranda” warning, comes from a 1966 Supreme Court case, Miranda v Arizona In that case, the Supreme Court had to decide under what circumstances police must inform people of their rights under the Constitution’s Fifth and Sixth Amendments – and how to do so
  • Miranda v. Arizona (1966): Supreme Court Case That Created the Miranda . . .
    In a 5-4 decision, the Supreme Court ruled in favor of Miranda, establishing that the prosecution could not use statements from custodial interrogation unless procedural safeguards were in place
  • Miranda v. Arizona | Oyez
    Chief Justice Earl Warren delivered the opinion of the 5-4 majority, concluding that defendant’s interrogation violated the Fifth Amendment To protect the privilege, the Court reasoned, procedural safeguards were required





中文字典-英文字典  2005-2009

|中文姓名英譯,姓名翻譯 |简体中文英文字典