查询词典 database file
- 与 database file 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
Each line contains a string message and a number x. It is our job to make entries in the database for the file name once and message x number of times.
每一行都包含一个字符串消息和一个数字x的这是我们的工作作出了文件名数据库项一次和消息x的次数。
-
Thus, if one database suffix is a prefix of another, it must appear after it in the config file.
因此如果一个数据库后缀是另一个的前缀,那么它在配置文件中就必须出现在另一个的后面。
-
Taking one with another eliminates business application, the data cent that pays close attention to is common file and database two kinds.
总的来看排除业务应用,所关注的数据分为普通文件和数据库两类。
-
In research and development of the system, mainly concluding key technologies of software-hardware environment analysis, no adapter interlink, terminal simulation, communication, sharing resources, binary file transfer algorithm , concurrent process, database-dumping and sharing, and to accomplish the basic a software design of E-classroom by adopting distribution system concept in minicomputer side , to accomplish the main software design of E-classroom by Winsock in microcomputer side , to study teacher software integration , try to realize transparent communication in the highest limit and sharing resources in the fullest extent , at last, weak and counter measure of the system is given, and the overall objective of heterogeneous computer is given to try to provide resemble system development with theory guide.
该系统的研究与设计过程中主要涉及软硬件环境分析、异型机无网卡互连、终端仿真、异型机通信、资源共享、二进制文件传输算法、并发进程、数据库转储与共享等关键技术,利用DSM分布式系统的概念完成了小型机部分电子教室的基础性软件设计,利用Winsock完成了微型机部分电子教室的主要功能模块,利用并发进程的概念研究了教师机软件的集成问题,使异型机用户之间达到最大限度的透明通信及充分的资源共享,给出了异构电子教室的弱点及解决对策,提出了系统的总体目标,力争为类似系统的研制提供理论指导。
-
If the suspicious file contains a new malware which is unknown to us at this point in time we will update our signature database.
如果可疑文件是一个我们所不知的新的威胁,在这时我们会及时更新我们的病毒库。
-
Authentication is the process of accepting or denying a request from a client, so AuthFilt will be notified each time an authentication request comes in. This sample uses a file to keep track of authorized users, but you might modify this sample to access a database which holds user info.
身份验证是接受或拒绝来自客户端的请求过程,因此AuthFilt将通知对方身份验证请求来英寸本示例使用一个文件的时间来保持跟踪的授权用户,但您可能会修改这个示例访问数据库,其中保存用户信息。
-
Coordinate sequence method is made up of the instruct information of polygon boundary x, y coordinate. It is the easiest polygon vector encoding method. The file structure of this method is easy, but because of the polygon boundary has stored two times, it will produce data redundancy, moreover, short of neighbor threshold information; Tree index encoding method make all the boundary points digitizing, store the coordinate sequence, connect the point index to boundary line, and then connect the line index to other polygons, so as to the tree index structure has came into being. It eliminates neighbor polygons boundary data redundancy problems; Topology structure encoding method is a method which by setting up a complete topology relationship structure, resolve the neighbor threshold and island information process problem. However, it makes arithmetic more complicated and makes database bigger.
坐标序列法是由多边形边界的x,y坐标对集合及说明信息组成,是最简单的一种多边形矢量编码法,文件结构简单,但多边形边界被存储两次产生数据冗余,而且缺少邻域信息;树状索引编码法是将所有边界点进行数字化,顺序存储坐标对,由点索引与边界线号相联系,以线索引与各多边形相联系,形成树状索引结构,消除了相邻多边形边界数据冗余问题;拓扑结构编码法是通过建立一个完整的拓扑关系结构,彻底解决邻域和岛状信息处理问题的方法,但增加了算法的复杂性和数据库的大小。
-
Automatic Storage Management provides a vertical integration of the file system and volume manager specifically built for the Oracle database files.
自动存储管理将底层的文件系统及其上的卷管理器集成,用于管理 Oracle 的数据库文件。
-
Automatic Storage Management is a vertical integration of both the file system and the volume manager built specifically for Oracle database files.
自动存储管理垂直地集成了文件系统及专为 Oracle 数据文件定制的卷管理器。
-
Just export your database as CSV or something, email it to me, and I'll write a program that reads that and writes out a word-processor file with everything formatted all nice just like you want.
你只要能用CSV或其他什么格式导出你的数据库内容,并且发个邮件给我,我就可以写出一个可以读懂这个并且输出一个漂亮的字处理文件格式的东西来满足你的要求。
- 推荐网络例句
-
This one mode pays close attention to network credence foundation of the businessman very much.
这一模式非常关注商人的网络信用基础。
-
Cell morphology of bacterial ghost of Pasteurella multocida was observed by scanning electron microscopy and inactivation ratio was estimated by CFU analysi.
扫描电镜观察多杀性巴氏杆菌细菌幽灵和菌落形成单位评价遗传灭活率。
-
There is no differences of cell proliferation vitality between labeled and unlabeled NSCs.
双标记神经干细胞的增殖、分化活力与未标记神经干细胞相比无改变。