英语人>网络例句>重新连接 相关的搜索结果
网络例句

重新连接

与 重新连接 相关的网络例句 [注:此内容来源于网络,仅供参考]

Delay controllable clock buffer, which could alter its propagation delay according to the corresponding internal reconfiguration on the CMOS connection, the number of steps and the drive strength for each step.

该设计可以通过内部结构的重新配置来改变CMOS管的连接方式、连接级数以及各级的驱动能力,从而获得不同的传输延时。

Metres, it's ThenMore in new version:Connect via BT/IrdaReading SMSChanging time/alarmsPressing keys…Once connected to a another phone via bluetooth you can:- read his messages- read his contacts- change profile- play his ringtone even if phone is on silent- play his songs- restart the phone- switch off the phone- restore factory settings- change ringing volume- And here comes the best"Call from his phone" it includes all call functions like hold etc.

If你不知道什么是超级蓝牙黑客程序,这可以控制通过MDM的其他民族的移动距离(10-15米,其当时的)更多的新版本:通过英国电信/ IrdaReading SMSChanging时间/ alarmsPressing keysOnce连接到另一个通过蓝牙连接你可以:-读他的消息,读他的接触,改变配置,发挥他的电话即使手机铃声就沉默,他的歌曲在他的电话是-重新启动手机,关掉手机,恢复出厂设置,改变铃声音量,在这里,来自于他的电话它包括所有的bestCall如持有etc。

Note to users with computers on Token Rings: If your local network uses a Token Ring and you unhook your computer by mistake, just plugging the connector back in isn't enough to get you back on the network.

使用令牌环的计算机用户要注意,如果你的本地网络使用了令牌环,而你因失误没能与网络连接,那么仅仅通过拔插连接插头是不能重新返回网络的,你的计算机必须再做一次网络联入。

The data capture mainly gathers the data from the network. Protocol analysis can analyse every segment of the data packet according to protocol standard. Data recover can recover all the data of the application layer of the TCP connection. IP spoofing can construct all kinds of packets and realize the network attack. Real-time interruption can interrupt the TCP connection of Both sides of communication as the third party. Fire wall can realize network access control. Then the system can protect the network information safety from many aspects.

数据捕获主要完成从网络采集数据的功能;分析还原包括协议分析和数据还原两部分内容,协议分析可以对捕获到的数据包按照网络协议规范分别进行各协议字段分析,数据还原功能可以将每条TCP连接中传输的所有应用数据进行重新组合,还原出原来数据的内容;IP欺骗指构造各种功能的数据包,实现网络攻击;实时阻断指第三方实时阻断通信双方的TCP连接,禁止他们进行数据通信;防火墙主要实现网络访问控制,保护内部子网的功能。

There is no an exhaustive list of SEO sins that Google does not tolerate, n or you'll get a letter from Google to inform you that you have been a bad boy and that's why you have been kicked out of its index but if you resort to any forms of SEO manipulation and you attempt to mislead search engines, y ou might expect that sooner or later you will have to deal with reinclusion.

此外过度优化现场内容,其他一些原因都被排除谷歌滥发硒、隐藏文本内容非法主办,连接坏邻居间连接,等等并无过错,无遗汉城谷歌不能容忍,氮你还是得回一封信谷歌通知你,你被坏男孩,所以你被开除出其指数但若诉诸任何形式的汉城你试图误导和操纵搜索引擎,肽Y欧预料可能迟早你会重新纳入处理。

In both cases, operations should be stopped and the joints disassembled, recleaned and fluxed.

在这些情况下,连接作业应该停止,并且拆开连接部件,重新清洗并且涂敷焊剂。

In the event you lose your Internet connection while downloading a site, the Resume Session allows you to pick up a session where you left off after reestablishing your Internet connection.

一旦你失去您的Internet连接,同时下载一个网站,让你的简历会拿起会议在你离开后,重新建立了您的Internet连接。

It was pointed out that the calculation formula for stress of laminated beam without pin joint in interlayer under bending experiment from relevant literature is wrong, and the calculation formulas for bending stress of laminated beam with or without pin joint in interlayer were rederived.

指出了有关文献推导出的上下梁层间无销钉连接叠层梁弯曲应力计算公式是错误的,重新推导出了上下梁层间无销钉连接与有销钉连接的叠层梁弯曲应力计算公式,对学生正确理解和认识叠层梁弯曲实验有理论指导意义。

Visual FoxPro closes connections even if Browse windows and forms displaying remote data are still open, and then automatically reconnects when the connection is needed again.

即使在显示远端资料的浏览视窗和表单仍然开启时,Visual FoxPro 也可以关闭连接,并在重新需要该连接的时候,又自动进行连接。

The invention relates to a node marking method in a wireless Mesh network, including that a first node transmits connection request information; a second node returns to connection response information or selects an undistributed correlation sign to mark the connection relation and return to one connection response information; the first node judges whether the correlation sign is conflicted with a distributed correlation sign or not, if yes, then retransmitting is carried out; the first node or the second node transmits information to a correspondent node; the correspondent node searches a corresponding transmitting node from a local record according to the analyzed MAC address and searches a Mesh node mark; by judging according to the mark, if no bit position is corresponding to the Mesh node mark or the corresponding bit position is set as 'no', which means that no data is transmitted to the correspondent node; otherwise, data is transmitted to the correspondent node.

本发明涉及无线Mesh网络中的节点标识方法,包括第一节点发送连接请求消息;第二节点返回连接响应消息,或者选择一个未分配的关联标志来标识连接关系,返回一个连接响应消息,第一节点判断关联标志与已分配的关联标志是否冲突,如是则重新发送;第一或第二节点向对端节点发送消息;对端节点根据解析出的MAC地址从本地记录中查找对应的发送节点,并查找Mesh节点标识;根据标识进行判断,若没有与Mesh节点标识对应的比特位或对应的比特位设置为&否&,则表示没有要发送给对端节点的数据;否则表示有。

第7/15页 首页 < ... 3 4 5 6 7 8 9 10 11 ... > 尾页
推荐网络例句

We have no common name for a mime of Sophron or Xenarchus and a Socratic Conversation; and we should still be without one even if the imitation in the two instances were in trimeters or elegiacs or some other kind of verse--though it is the way with people to tack on 'poet' to the name of a metre, and talk of elegiac-poets and epic-poets, thinking that they call them poets not by reason of the imitative nature of their work, but indiscriminately by reason of the metre they write in.

索夫农 、森那库斯和苏格拉底式的对话采用的模仿没有一个公共的名称;三音步诗、挽歌体或其他类型的诗的模仿也没有——人们把&诗人&这一名词和格律名称结合到一起,称之为挽歌体诗人或者史诗诗人,他们被称为诗人,似乎只是因为遵守格律写作,而非他们作品的模仿本质。

The relationship between communicative competence and grammar teaching should be that of the ends and the means.

交际能力和语法的关系应该是目标与途径的关系。

This is not paper type of business,it's people business,with such huge money involved.

这不是纸上谈兵式的交易,这是人与人的业务,而且涉及金额巨大。