英语人>网络例句>backspace key 相关的网络例句
backspace key相关的网络例句

查询词典 backspace key

与 backspace key 相关的网络例句 [注:此内容来源于网络,仅供参考]

Of course Apple iPhone doesn't simply focus on the molding, it adopts Muti-touch techinique. There are only a screen and a backspace key in the front, and all the other functions shoule be operated by users' fingers.

当然苹果iPhone并不是一款简单以造型为卖点的产品,其最大的特点在于突破性的采用了人体感应式的Muti-touch触摸控制技术,机身正面除了屏幕和一个返回键外别为他物,整部手机的所有功能都要用户通过自己的手指来操作。

If more programs had modal Undo tools, users would soon adapt to them. The y would even come to expect them the way they expect to find the Backspace key on word processors. Deleted data buffers

如果更多的程序有着模型化的撤销工具,用户会很快习惯它们,他们甚至会更加期望在其他软件中找到类似于字处理程序中的退格键工作方式。

If a user mistypes something, then enters an unrelated function such as paragraph reformatting, then presses the Backspace key repeatedly, the mistyped characters are erased and the reformatting operation is ignored.

如果在用户错误输入之后,又执行了一个不相关的操作。如重新设置段落格式,接着反复地按退格键。错误输入的字符被删除,而段落格式设置会跳过去。

When a user mistypes, the Backspace key "undoes" the erroneous characters.

当用户输入错误时,可以按退格键&撤销&错误的字符。

First chapter is the summary, mainly introduced the project basic survey; Second chapter for the dam site hydrology characteristic, introduced the Hubei -01 key project in the basin specially is nearby the dam site hydrometeorology survey; Third chapter for the key position and the storehouse district terrain geology condition, introduced explained the dam site specially is nearby the dam spool thread terrain geology condition; Fourth chapter for the key position building shaping and the hydrology computation, including determined key position the project rank, the building shaping, adjusts Hong to calculate, blows off the bottom hole cross section size drawing up with initially to draw up the key position scheme of arrangement; Fifth chapter draws up for the size with the dam body arrangement, including the shaping, the Liang section plane determination, the dam body dam base guards against infiltrates the draining water facility the arrangement and the dam body plane arrangement and the stress stable analysis computation; Sixth chapter for the flood discharge design, mainly is the top of dam detailing and the downriver disappears can design; Seventh chapter for blows off the building the design, mainly is to imports the building the detailing strobe arrangement and Kong Shen and the exportation disappears can the design; Eighth chapter pilots the system and the power plant workshop design for the power plant, mainly is directs the system and the power plant workshop design to the power plant; Ninth chapter is ground processing, including ground excavating, the cleaning up, solidifies the grouting, the curtain is in the milk and all that some processing measure.

第一章为综述,主要介绍了工程的基本概况;第二章为坝址水文特性,介绍了鄂-01枢纽工程所在流域特别是坝址附近的水文气象概况;第三章为枢纽及库区地形地质条件,介绍说明了坝址特别是坝轴线附近的地形地质条件;第四章为枢纽建筑物的选型及水文计算,包括确定枢纽的工程等级,建筑物选型,调洪演算,放空底孔断面尺寸的拟定和初步拟定枢纽布置方案;第五章为拱坝尺寸拟定和坝体布置,包括拱坝的选型、拱冠梁剖面的确定、坝体坝基防渗排水设施的布置及坝体的平面布置和应力稳定分析计算;第六章为泄洪的设计,主要是坝顶的细部设计和下游消能设计;第七章为放空建筑物的设计,主要是对进口建筑物的细部设计闸门布置及孔身和出口消能的设计;第八章为电站引水系统及电站厂房设计,主要是对电站引系统和电站厂房的设计;第九章为地基处理,包括地基的开挖,清理,固结灌浆,帷幕灌浆以及其他一些处理措施。

Following are the main results of this thesis: Detailedly analyze some related schemes concerning group key management, We reconstruct a tree key management scheme, in comparison with Logical Key Hierarchy and One-way Function Tree schemes, we find that it has good performance of key storage, re-key communication costs and calculation of group manager.

本论文的主要研究成果如下:对目前存在的多播组密钥管理方案进行了详细的研究分析,提出了一种改进的树型管理方案,与逻辑密钥分层方案和单向函数树方案进行分析比较,它在密钥存储、密钥更新、通信量以及组管理者的计算量方面均有较好的性能。

Another set cryptographically key is public key and private key of address owner.And the public key is used in generating OCGA address.And the private key is used in generating digital signs.

另一组是ACGA地址主人的公钥和私钥,公钥用来生成OCGA地址,而私钥用来对该地址发送的消息进行数字签名。

An Advanced Cryptographically Generated Addresses method is proposed.It uses two sets of cryptographically keys to produce IPv6 address.One set cryptographically key is public key and private key of ISP.And the private key is used in assigning ACGA address,the public key is used in validating whether the address come from the ISP that it claimed.

提出一种改进的密码生成地址方法,ACGA涉及到两组公钥和私钥对,一组是ISP的公钥和私钥对,其中私钥在分配ACGA地址中使用,公钥在验证该地址是否存在或是否来自声称的ISP中使用。

The design includes many new technologies in data exchange and data security, they are: Converting non-XML data to XML in order to apply the XML security technology to more data types; Using the technology of XKMS and PKI to manage the public key in order to overcome the shortage of complexity and difficulty in using PKI and improve the efficiency of the public key management; Using Diffe-Hellman algorithm combining with the public key technology to exchange secret key in order to furthest increase the security of the key; Using the technology of XML digital signature algorithm to ensure the integrity, message authentication and signer authentication of the data; Using the technology of XML encryption to ensure confidentiality of the data; Defining delegable access rules on the structure and content of the XML documents to provide fine-grained access control. According to the XML security framework, a XML security library is designed and implemented.

在对XML及其安全技术主要包括XML加密技术、XML数字签名、公钥管理、密钥产生和交换进行研究的基础上,结合传统密码技术和XML安全技术提出了一种基于XML的数据安全模型,模型中包含了目前网络数据交换和安全领域的一系列最新技术,主要有:将非XML格式数据转换为XML格式数据的方法,以保证现有的大部分网络数据能够应用XML安全技术;使用XML公钥管理技术结合PKI技术管理公钥,以克服PKI技术实施和部署复杂、难度大等问题,提高公钥管理的效率;使用Diffie-Hellman算法结合公钥技术交换密钥,以最大限度保证密钥的安全;使用XML数字签名技术保证数据的完整性、不可否认性和发送方身份认证;使用XML加密技术保证数据的机密性;根据XML文档的内容和结构定义授权访问规则进行良好的访问控制。

In this context, we propose a time deployment based, pairwise keymanagement scheme called TDBK. In TDBK, the network lifetime is divided intoseveral consecutive network deployment statuses which are separated by nodedeployment events. Each node to be deployed is assigned its key informationthrough a special two-tier key predistribution mechanism, and timely deletes theuseless part of the key information through the key elimination mechanism eachtime the pairwise key establishment is finished in terms of a new nodedeployment event.

在此背景下,我们提出了一种基于时间部署的对****管理方案(Time Deployment Based Keying,TDBK),该方案将网络的生命周期分为多个连续的网络部署状态,相邻的部署状态之间通过节点部署事件分隔,每个节点通过特殊的两级****预分配机制来获得用于建立对****的****信息,随后通过****清除机制在每次节点部署事件发生时进行的对****建立过程完成后及时地删除其中无用的****信息。

第4/500页 首页 < 1 2 3 4 5 6 7 8 9 ... > 尾页
相关中文对照歌词
Down On Longboat Key
Key Lime Pie
The Key
Ring Ding Dong
Love Is The Key
J'Adore
Key West
Paranoia Key Of E
Key Of Life
Key To The Kingdom
推荐网络例句

Although translator has turned from being a crystal ball by which the original culture can unrestrainedly penetrate to another crystal ball by which the target culture can freely traverse, the translator's personal embodiment, in the process of cognitive act, are still absent in translation studies. Translators are still subjects without body or simply disembodied subjects.

译者虽然由原语文化可以自由穿透的玻璃球变成了译语文化可以自由穿越的玻璃球,但译者认知过程中的个体体验在翻译研究中依然缺席,译者依然仅仅是一个没有躯体体验的主体。

Chillingly, he claimed our technology is 'not nearly as sophisticated' as theirs and "had they been hostile", he warned 'we would be been gone by now'.

令人毛骨悚然的,他声称我们的技术是'并不那么复杂,像他们一样,和"如果他们敌意",他警告说,'我们将现在已经过去了。

And in giving such people " a chance to be themselves," he saw himself as a champion of th South's hardscrabble underclass, both black and white.

他给了这些人一个"成就自己"的机会,同时将自己看成是南方那些贫困的下层人民的声援者。