英语人>网络例句>系统文件 相关的搜索结果
网络例句

系统文件

与 系统文件 相关的网络例句 [注:此内容来源于网络,仅供参考]

As an illustration, comparea database file to an address filing system kept in abox of 3 X 5 file cards.

举例而言,把一个数据库文件比作一个存放在3 X 5文件卡片盒中的地址档案系统。

The Parties agree that all ideas, know-how, processes, information, drawings, documents, designs, models, inventions, copyrightable materials and other tangible and intangible materials authored, prepared, created, made, delivered, conceived or reduced to practice, in whole or in part, by Contractor in the course of providing the Services, including without limitation computer programs, computer systems, data and documentation (collectively, the "works") are the sole and exclusive property of the Company and shall be considered works made for hire.

双方同意,承包方在提供服务的过程中创作,筹划,创造,制作,交付,设想或付诸实践的任何想法,技术,程序,信息,图纸,文件,设计,模型,发明,可获得著作权的材料和其他有形和无形的材料之全部或部分,包括但不限于电脑程序,电脑系统,数据和文件合称&作品&,是公司的独有财产,应被视为承包方受雇佣而创作的作品。

The transmitted MPPSfiles contain basic dosimetric information butmany Radiological Information Systems stilldo not accept these files.

传输的无阻塞文件包含的基本资料,但剂量学许多放射信息系统仍不接受这些文件。

Protection System may actually list necessary Windows files as threats — so don't try to remove any files Protection System dubs spyware.

保护制度实际上可能需要Windows文件清单的威胁-所以不要尝试删除任何文件保护系统杜布斯间谍。

Firstly, this article in view of the CATIA CLSF, elaborated this software post-processing way, the operating mode of the three principles, and has given the explanation to this software overall constitution; Secondly, after having analysised and researched thoroughly how the CATIA/CAM module creates the APTSOURCE file and its format, the rules of CNC milling machining center MODIMILL 4L, FIDIA PowerXP20system and the coordinate transformation of the machine tool, we programmed the code of CMSPP special post-processing software and compiled the interface based on the dialog box pattern which the fine outward appearance, is easy to operate; Finally, from machining practice, the NC program by the post-processing program can be run in the machining center to machine the part.

首先,本文针对CATIA刀位文件的特点,提出了该软件的后处理方式以及软件运行的三条原则,并对该软件的总体构成作了阐明:其次,本文对CATIA/CAM模块生成的APTSOURCE文件格式、FIDIA PowerXP20数控系统的规则以及MODIMILL 4L铣削加工中心坐标转换数学模型进行了深入的分析与研究,在此基础上用VC++6.0语言编写了CMSPP专用后处理软件的算法代码,并且基于对话框模式编写了外观精美、易于操作的功能界面;最后,通过实例验证表明:开发的后置处理软件所生成的数控加工程序能够在加工中心上运行并能进行有效地加工。

The Glary Undelete application was designed to be an easy-to-use yet powerful file undelete solution for FAT and NTFS file systems.

该Glary取消删除应用程序的设计是一种易於使用且功能强大的文件反删除解决方案FAT和NTFS文件系统。

This changes the way bjam searches for the target such that it ignores mathes for file system items that are not file, like directories.

这将改变 bjam 查找目标的方式,它将忽略那些被匹配到的但不是文件的文件系统项目,如目录。

X Virtual Network Control Win32 - extension to vnc in vb6 visual basic that copies, installs, configures and executes and also removes the vnc system on a remote win nt-based machine. access to domain administrators and limited to local machine, imports reg-files to remote registry silen

x Virtual Network Control Win32用vb6扩展vnc,它可以复制、安装、配置和执行,也可以删除一个远程win nt系统机子上的vnc系统,访问域管理员,限制到本地主机,导入注册表文件到远程注册系统。

With master degree in Finance,those with Bachelor Degree but with ACCA or other professional qualifications may also apply;graduates from overseas universities will be an advantage;teaching and working experience of 3 years or above;fluent in English, both spoken and written;good interpersonal skil...

1。参与制订公司年度总计划和季度、月度生产计划的制定。2。组织实施并监督、检查生产过程中质量体系的运行。3。审阅生产系统及与其相关的文件,在权限范围内签发文件。4。组织新技术、新工艺、新设备的应用推广,持续优化改善工艺方案,提高整体的工艺水平,不断提高产能和质量。5。指导、监督、检查所属下级的各项工作,掌握。。。

Steg B(superscript +)-Tree, which uses steganographic technologies to overcome above mentioned weakness is presented by hiding the existence of data so that an adversary could get no information about whether the protected data ever exists without correct object name and access key.

介绍一种新的着重于隐藏数据的存在性的加密手段-隐文加密(Steganography,隐写术)来对重要文件的存储进行加密,该方法采用隐文B树Steg B(上标+ Tree建立UNIX系统的文件索引,并通过隐藏表将隐文B树索引隐蔽起来,使攻击者无法知道重要信息的存在,从而使要保护的信息更安全。

第32/100页 首页 < ... 28 29 30 31 32 33 34 35 36 ... > 尾页
推荐网络例句

This one mode pays close attention to network credence foundation of the businessman very much.

这一模式非常关注商人的网络信用基础。

Cell morphology of bacterial ghost of Pasteurella multocida was observed by scanning electron microscopy and inactivation ratio was estimated by CFU analysi.

扫描电镜观察多杀性巴氏杆菌细菌幽灵和菌落形成单位评价遗传灭活率。

There is no differences of cell proliferation vitality between labeled and unlabeled NSCs.

双标记神经干细胞的增殖、分化活力与未标记神经干细胞相比无改变。