英语人>网络例句>应用文件 相关的搜索结果
网络例句

应用文件

与 应用文件 相关的网络例句 [注:此内容来源于网络,仅供参考]

Within a click the AlphaWipe Tracks Cleaner securely erases your internet tracks, application tracks, computer activities and programs history information stored in many files and unevident places on your computer.

在一个点击alphawipe轨道清洁安全的清除您的Internet轨道,轨道上的应用,计算机的活动和节目的历史资料储存在许多文件和unevident地方,在您的计算机上。

PDF Unlocker is a simple and useful application that can remove all kinds of restrictions on PDF files.

PDF格式Unlocker是一个简单的和有用的应用程序,可以消除各种限制的PDF文件。

This Interface Builder file creates an unpopulated window.

等等。这些文件包含一个粗略的框架,你可以自定义和扩展创建应用程序。

This software allows to record actions of the user of a computer on start the applications, opening documents, access to the Internet and usings removable media.

这个软件允许记录的行动使用者的计算机上开始应用,开放的文件,进入因特网和usings可移动媒体。

Organizers of the Webby Awards have named their 10 most influential Internet moments of the decade, spanning the emergence of the iPhone to the recent widely used Twitter in Iranian election protests.

威比奖组委会日前评出了10年间互联网最重要的10大时刻,苹果iPhone的上市、伊朗选举抗议活动中Twitter的广泛应用、维基百科的推出和文件共享网站Napster的关闭均赫然在列。

Lackluster performance of Vista has dwarfed its grand ambition to annihilate fledgeling competitors and forced the titan onto the defensive.

这个版本当然吸取了Vista的失败教训,在任务栏、文件共享、网上搜索、家用网络连接以及对多核处理器的应用方面都有提升。

MIDP 2.0-a group MIDlet achieve buttoning transfer generation, the use of various sources ...

一组 MIDlet,实现单音调生成、使用各种源(如 JAR 文件和 HTTP)的音调排序以及一个应用程序中的混音、WAV 和音调排序变化。

The first and most important tier of these consisted of the cerebrates, each entrusted with direct control of a sizable section of the Swarm.

最令人感兴趣的就是,这些可以通过一个配置文件来灵活地进行配置,而不需要修改应用的代码。

As applied to the computer security topics the activity analysis and authentication is performed when it is impossible to get document copies, which user worked on, for example, stored either on ciphered or dismounted disk containers.

至於应用到计算机安全的主题活动,分析和认证,是演出时,是不可能得到的文件副本,而用户的工作,例如储存或是加密或徒步磁盘箱。

As applied to the computer security topics the activity analysis and authentication is performed when it is impossible to get document copies, which user worked on, for example, stored either on ciphered or dismounted disk containers.

作为应用到计算机安全的主题活动,分析和验证,是演出时,是不可能获得文件副本,其中用户的工作,例如储存或是对加密或卸载磁盘容器。

第33/40页 首页 < ... 29 30 31 32 33 34 35 36 37 ... > 尾页
推荐网络例句

This one mode pays close attention to network credence foundation of the businessman very much.

这一模式非常关注商人的网络信用基础。

Cell morphology of bacterial ghost of Pasteurella multocida was observed by scanning electron microscopy and inactivation ratio was estimated by CFU analysi.

扫描电镜观察多杀性巴氏杆菌细菌幽灵和菌落形成单位评价遗传灭活率。

There is no differences of cell proliferation vitality between labeled and unlabeled NSCs.

双标记神经干细胞的增殖、分化活力与未标记神经干细胞相比无改变。