英语人>网络例句>access 相关的网络例句
access相关的网络例句

查询词典 access

与 access 相关的网络例句 [注:此内容来源于网络,仅供参考]

As for frame buffer access, the embedded compression for frame buffer access is considered in Part III.

而在框架缓冲器存取方面,针对框架缓冲器存取的嵌入式压缩则在第三部分中做考虑。

This gives you very limited access to our forums and no access to our free downloads.

这使你获得很有限的,并没有进入我们的论坛免费下载。

And how did they get access, how will you gain access to a similar situation?

他们是如何能进入到这种环境的,如果是你自己,你该如何进入到类似的情境中呢?

In that case, you have to change the access-rights to get access to the file.

在这种情况下,你必须更改访问权限来获取文件的访问权。

In one aspect, it uses a time bank to control access time, and the time bank controls how long a virtual graphics adapter offered to the video client partition can access the graphics adapter resources.

一方面,它使用时间银行来控制访问时间,该时间银行控制提供给视频客户机分区的视频图形适配器能够访问图形适配器资源多久。

The first is if someone has physical access to your computer and your administrative password, and the second is if someone has already gained access to a machine remotely through a rootkit hack.

首先是,如果有人能够物理访问您的计算机和您的管理员密码,第二个是,如果有人已经获得通过的rootkit黑客访问远程计算机。

A analysis of integration were indicate that:(1) The naming of a non-word was correlation with the whole function of cerebral hemispheric.(2) There were different between Phonological access and semantic access .

综合性数据分析结果表明:(1)假词的命名过程与大脑半球的整体功能有明显的相关,(2)语音通达与语义通达的中枢加工过程是有差异的。

Her worship seems to be hostile to sexual experience, that is, Hippolytus has privileged access to her, he can speak with her but cannot see her, and this access seems to be connected with the virtue of chastity.

她的崇拜似乎对性经验具有敌意-希波理特斯虽然享有特权得以接近她,但只能和她对话,却无法看见她;这种形式的接触是和贞节的美德有关。

Since the firewall to prevent illegal network access, then access is not legally prevented even easier?

既然防火墙能阻止非法的网络访问,那么合法的访问不就更容易阻止了?

This is due to malicious attackers to steal, modify the network transmission of information through the Internet posing as legitimate users of illegal access to the remote host, access to stored on the host of confidential information, or take up network resources and prevent other users and so on.

这是由于怀有恶意的攻击者窃者、修改网络上传输的信息,通过网络冒充合法用户非法进入远程主机,获取存储在主机中的机密信息,或者占用网络资源,阻止其他用户使用等。

第27/100页 首页 < ... 23 24 25 26 27 28 29 30 31 ... > 尾页
相关中文对照歌词
Access Me
Access Denied
Access Babylon
推荐网络例句

The split between the two groups can hardly be papered over.

这两个团体间的分歧难以掩饰。

This approach not only encourages a greater number of responses, but minimizes the likelihood of stale groupthink.

这种做法不仅鼓励了更多的反应,而且减少跟风的可能性。

The new PS20 solar power tower collected sunlight through mirrors known as "heliostats" to produce steam that is converted into electricity by a turbine in Sanlucar la Mayor, Spain, Wednesday.

聚光:照片上是建在西班牙桑路卡拉马尤城的一座新型PS20塔式太阳能电站。被称为&日光反射装置&的镜子将太阳光反射到主塔,然后用聚集的热量产生蒸汽进而通过涡轮机转化为电力