查询词典 used to
- 与 used to 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
You know I used to look in the mirror and I used to go nearly before they were pulling it up and they told me just to look at the lollypop and I do that.
他们告诉我只要看棒棒糖就可以了,我也照着做了。
-
The most widely used bank-to-bank lending rate, the London interbank offered rate, which has risen sharply, is also used to calculate interest rates on credit cards and many adjustable-rate mortgages.
运用最广泛的伦敦银行同业拆息近期急剧上扬,该指标也被用于计算信用卡和许多可调息按揭的利率。
-
The va lues of these multipath parameters can be used to make a criterion suitable for environment classification in software antenna systems , and the eigenvalue distr ibution can be used to identify the type of various environments .
因此根据多径参数的大小可以确定适合软件天线环境分类的分类标准,并且根据矩阵特征值的分布特点可以识别不同的环境类别
-
I used a photographer's lupe (magnifying device used to view slides) to see what was going on close up.
我用了一个摄影师的放大镜(放大设备用于查看幻灯片),看看有什么是在结束了此案。
-
Methods Samples of Cerinate Porcelain Veneers were prepared in different thickness(0.5mm、0.75mm、1.00mm)and different Vita shade(A1、A2、A3).Luting resins of different colors were used to lute these samples on teeth surface with different preparation depth.Colorimeter was used to measure the L*a*b* of the teeth surface without preparation and after covering with Cerinate Porcelain Veneers.
制作不同颜色(A1、A2、A3色)不同厚度(0.50mm、0.75mm、1.00mm)的Cerinate瓷贴面,将其用不同颜色的粘结树脂粘固到对应的牙齿预备面上,用测色仪分别测量牙齿预备前及粘固了Cerinate瓷贴面后牙面的L*a*b*值,比较两者的差异。
-
For instance, the Chinese Macrame was used to decorate chairs used by the emperor and empress, corners of sedans, edges of parasols, streamers attached to the waistbands of lady's dresses, as well as all manners of seals, mirrors, pouches, sachets, eyeglass cases, fans and Buddhist rosaries.
例如,中国结被用来装饰用的椅子天皇和皇后美智子,角落轿车,边伞,旗重视腰带的女式服装,以及所有的举止海豹,镜子,袋,袋,眼镜情况下,球迷和佛教念珠。
-
It includes four parts: 1 Part I, it introduces the basic knowledge of computer viruses such as computer virus definition, history and important viruses events, features, behavior phenomena, difference with computer software and hardware troubles, damage behavior and capability, classification, naming, future trend, etc; 2 Part II, it introduces the corresponding knowledge of computer systems related to computer viruses such as the composing of software and hardware of the computer system, storage media and its working mechanism, interrupt technologies,.com/.exe/.pe file formats and their working mechanism, etc; 3 Part III, it introduces computer virus mechanism and theory such as computer virus structure, work flow, working mechanism of key modules, typical technologies used to design computer viruses including the corresponding traditional technologies (interrupt filching, memory resident, etc.), the corresponding new routine technologies (self-encrypting, Mutation Engine, etc.), and the corresponding new technologies used by some prevalence computer viruses such as macro viruses, e-mail viruses, worm, hacker, Trojan, mobile phone viruses, the working mechanism analysis of some kinds of typical and prevalence computer viruses such as file-type viruses, macro viruses, e-mail viruses, worm viruses, hacker, Trojan, mobile phone viruses, the analysis of some typical and prevalence computer viruses examples including BALL viruses, WORD macro viruses, WantJob viruses, Code Red viruses, BO Trojan, etc; 4 Part IV, it introduces the defense and killing technologies of computer viruses such as the aim and criterion of computer viruses defense and killing, prevention methods and corresponding technologies, detection technologies (comparison method, character code scanning method, behavior inspecting method, analysis method, etc.), manual and automatic killing technologies, immunity technologies such as IBM digital immunity system, new anti-viruses technology trends (real-time anti-viruses technologies, 32 kernel technologies, active kernel technologies, etc.), some typical virus defense and killing softwares (Symantec AntiVirus product, PC-Cillin AntiVirus product, etc.), the defense and killing method analysis of some kinds of typical and prevalence computer viruses (file-type viruses, macro viruses, worm viruses, hacker, etc.), for example, firewall and intrusion detection technologies for anti-hacker, the defense and killing of some typical and prevalence computer viruses examples including WORD macro viruses, Code Red viruses, BO Trojan, etc.
课程内容具体包括四大部分:1)第一部分,介绍计算机病毒基本知识,包括:计算机病毒定义、病毒发展史及重大事件、病毒特点、病毒表现现象及与软硬件故障的区别、病毒破坏行为及危害性、病毒的传播途径及媒介、病毒分类、病毒的命名及计算机病毒技术发展趋势等内容;2)第二部分,介绍与计算机病毒有关的计算机系统相关知识,包括:计算机系统软硬件组成、存储介质结构及工作原理、计算机系统引导机理及流程、中断技术、。com/。exe/。pe等文件格式及工作机理等内容;3)第三部分,讲解计算机病毒机理,包括:计算机病毒的组成结构、病毒工作流程、病毒引导/触发/感染/破坏等模块的工作机理、计算机病毒所采取的编制技术(包括中断窃取/内存驻留等传统编制技术、自加密/隐形/变形机等新的常规编制技术、宏病毒/电子邮件病毒/网络蠕虫/特洛伊木马/黑客/手机病毒等一些新的流行病毒所采取的编制技术等)、一些类型的典型或流行计算机病毒的工作机理分析(包括:引导型病毒、文件型病毒、宏病毒、电子邮件病毒、蠕虫病毒、黑客、特洛伊木马、手机病毒等)、一些典型或流行的计算机病毒实例剖析(包括:小球病毒、WORD宏病毒、求职信病毒、红色代码病毒、冰河木马等)等内容;4)第四部分,讲解计算机病毒防治技术,包括:计算机病毒防治目的、病毒防治策略及规范、病毒在管理和技术上的预防措施、病毒检查技术(包括:比较法/病毒特征码扫描法/行为监测法/虚拟执行法/分析法等)、手工和自动病毒清杀技术、病毒免疫技术(包括:针对某种一次性感染病毒的基于病毒标签的免疫方法/基于自我完整性检查的计算机病毒免疫方法/IBM的数字免疫系统等)、反病毒技术的新发展(包括:实时反病毒技术/32位内核技术/主动内核技术/以毒攻毒技术等)、诺顿/趋势/金山等公司的病毒防治软件产品、一些类型的典型或流行的计算机病毒(包括:引导型病毒、文件型病毒、宏病毒、蠕虫病毒、电子邮件病毒、手机病毒、黑客、特洛伊木马)的防治措施(其中,也包括介绍面向防范黑客攻击的防火墙、入侵检测技术)、一些典型或流行的计算机病毒防治实例剖析(包括:WORD宏病毒、红色代码病毒、冰河木马v1.1/v2.2等)、多层次病毒防护体系等内容。
-
The assay obtained the results in aspects below:1 、 customing the system for designers, building new style of lines, predigesting and combing the commands, and writing some simple but useful programs for the real needs of design.2、 according to the drawing standard of Water and Waste Water System, making equipments, instruments, accessories which were often used to be a block, then building magic lantern menu which can be easily used.3、 setting up a Aided System of calculating which remedied the lack of calculation function of AutoCAD.
开发了针对建筑给排水设计的辅助计算系统,弥补了AutoCAD本身不具备计算功能的缺憾。本系统为设计人员提供了给水、排水、消防、热水等系统的水力计算,并能进行水箱、化粪池、消火栓的选型。
-
I used to be a person, so I used to have magic.
我曾经是一个人,所以我曾经拥有魔法。
-
Many long tunnels with bigger diameter used to water diversion are buried under deep strata with complex geology condition. The TBM is the first construction method because of its advantage of the high boring speed. TBM is a type of man-sized machine with high mechanisation and automatization used to boring tunnels, TBM's technique is composite.
本次论文在对TBM 文献资料的积累及本人施工工作经验的基础上,借鉴前人丰厚的研究成果,同时结合目前本人所从事的具体TBM 隧道工程项目,应用所掌握的理论知识,利用项目所配置的施工条件,针对目前TBM 在隧道工程应用中存在的问题做了大量的系统的研究工作,并取得了一定的研究成果。
- 相关中文对照歌词
- Used To Know Remix
- I Could Get Used To This Lovin' Thing
- My Memory Ain't What It Used To Be
- Get Used To It
- I Used To Know How To Walk On Water
- You Used To Love To Dance
- She Used To Say That To Me
- Remember When (Used To Be Used To It)
- To Think I Used To Love You
- He'll Never Be...(What I Used to be to You)
- 推荐网络例句
-
But we don't care about Battlegrounds.
但我们并不在乎沙场中的显露。
-
Ah! don't mention it, the butcher's shop is a horror.
啊!不用提了。提到肉,真是糟透了。
-
Tristan, I have nowhere to send this letter and no reason to believe you wish to receive it.
Tristan ,我不知道把这信寄到哪里,也不知道你是否想收到它。