恢復刪除 的英文怎麼說

中文拼音 [huīshānchú]
恢復刪除 英文
undelete
  • : Ⅰ形容詞1 (重復) repeated; double; duplicate 2 (繁復) complex; compound Ⅱ動詞1 (轉過去或轉過...
  • : Ⅰ動詞1 (去掉) get rid of; eliminate; remove 2 [數學] (用一個數把另一個數分成若干等份) divide:...
  1. To recover a dropped table, do the following

    的表,需要執行下面一些操作:
  2. Export is especially good to recover from a dropped table

    Export特別適合於從的表中數據
  3. Roll forward using complete recover dropped table to e : - tmp

    使用完全將被表前滾至e : tmp 。
  4. In release 4, this functionality was changed subtly so that the deleted data was overwritten with random characters to make it irretrievable

    Release 4巧妙地修改了這項功能,用隨機字元覆蓋數據,使其不能
  5. The message has been deleted. the person you sent it to may or may not have seen it. they might undelete it at a later time and read it

    此消息已經被。接收者可能閱讀了該消息也可能沒有閱讀。他可能在將來該消息然後閱讀。
  6. The principles of erasure codes used under binary erasure channels are summarized and erasure codes which belong to standard classes of rs codes are introduced with emphasis on cascaded low - density erasure codes with linear time encoding and erasure recover algorithms. thresholds of regular degree distributions are analyzed. it is shown that low - density erasure codes based on ( d, 2d ) - regular sequences of degree distribution are not close to optimal ( d 3 ). two pares of irregular degree distribution sequences are introduced and a pare of improved right regular sequences of low - density erasure codes are presented, it is testified that the new sequences are asymptotically quasi - optimal. in the meantime, simulations of cascaded low - density erasure codes based on a few types of special sequences of degree distribution available are given, together with performance analyses on these codes

    闡述了應用於通道下的糾碼基本原理,介紹了兩類標準的rs碼類糾碼,重點分析了具有線性時間編碼和演算法的漸近好碼?級聯型低密度糾碼,分析了正則度分佈的閾值,對正則低密度校驗碼在通道下的糾錯性能進行了模擬,從理論上證明了基於( d , 2d ) -正則度序列的低密度糾碼都不是漸近最優碼( d 3 ) ,同時還分析了非正則低密度校驗碼的度序列設計,基於右邊正則序列提出了一種改進型右邊正則序列,證明了此序列為漸近擬最優的,對基於幾類現有典型度分佈序列的級聯型低密度糾碼進行了模擬模擬及性能分析; 3
  7. When a user drops a table in db2 udb, you can either do a database level point - in - time recovery, rolling forward to the point before the table is dropped ; or, better still, use a table space level roll forward operation

    當用戶db2 udb中的表時,您可以執行數據庫級時間點,前滾至表之前的時間點;或者最好仍然使用表空間級的前滾操作。
  8. This article provides a library of procedures with a simple interface that allow the user to back up all objects in a given schema onto the file system, restore the backup under a different schema, and also drop all objects in a given schema

    本文提供一個具有簡單介面的過程庫,使用戶能夠將給定模式中的所有對象備份到文件系統中、在另一個模式下備份以及給定模式中的所有對象。
  9. It applies an interval method to select element in the evolutionary structure optimization method ( eso ), and recovers or deletes element by the “ birth and dead ” function of element. another method viewed as second order smoothing technique for suppressing the checkerboard patterns has been proposed based on the filtering function ’ s principle. then the above methods are applied to solve a temperature - controlling problem in the steady heat conducting field and a multi - objective topology optimization problem considering multiple load cases and coupled effect

    本文基於ansysparametricdesignlanguage ( apdl ) ,提出漸進結構法中應用區間法進行單元的篩選,通過單元「生死」的功能實現單元的,根據濾波函數法原理提出修改的二階棋盤格處理方法,並就穩態熱傳導溫度控制問題,考慮熱、力耦合的多載荷工況的多目標拓撲優化設計問題進行求解。
  10. In the event that the original data on your hard disk is accidentally erased, overwritten, or becomes inaccessible because of a hard disk malfunction, you can easily restore the data from the archived copy

    如果硬盤上的原始數據因為磁盤故障意外地被、覆蓋或變得不可訪問,就可以容易地從存檔的副本中數據。
  11. Using random data to rewrite the files or the empty disk districts, insuring that data will be removed absolutely after being deleted ; impossible to recover

    採用以隨機數據多次重寫文件或空磁盤區的方案,確保文件的數據在后徹底清,不可
  12. For the super cautious users we also offer secure file erasing. by overwriting the files before deleting them, making it impossible to recover the data

    針對十分謹慎的用戶,我們也提供確認文件。通過文件前覆寫,使它不能數據。
  13. Asset management ensures that only authorized persons can view or change project assets ; it also provides the ability to reliably recover work lost in the event of an authorized user s mistake, such as the accidental deletion or overwriting of source code files

    資產管理保證了只有被授權的人可以瀏覽或改變項目資產;它還提供了可靠的對被授權用戶錯誤操作事件的能力,例如對源代碼文件的意外或該寫。
  14. How to recover a deleted tablespace

    表空間該如何
  15. You have to turn on the drop recovery option to y for table spaces are enabled for dropped table recovery initially

    您必須將drop _ recovery選項設置為y ,來為表空間啟用被表的支持。
  16. Issue the commands below to check whether a table space is enabled for dropped table recovery and if not, turn it on

    發出下面的命令來檢查是否為表空間啟用了對被表的支持,如果沒有啟用,就打開它。
  17. To add " in order to implement article 39 of the basic law " after " that, " ; to delete " the covenants " and substitute with " these two international covenants " ; to delete " mainland china and " ; to insert " continue to " before " enjoy the basic rights " ; to delete " which are recognized internationally " and substitute with " prescribed therein after china resumes the exercise of sovereignty over hong kong "

    三十九條, 」 ,在「保障」之前加上「以」 ,並之後的「中國內地和」 ,在「香港的居民」之後加上「在中國對香港行使主權后繼續」 ,在「享有」之後將「國際
  18. The same brute - force approach used to restore a schema is used to drop a schema

    用來模式的強制性方式也用於模式。
  19. Under the simple recovery model, performing a checkpoint removes the inactive part of the log without making a backup copy. this truncates the log by discarding all but the active log

    在簡單模式下,執行檢查點將在不備份日誌的情況下日誌的不活動部分,並通過放棄活動日誌以外的部分截斷日誌。
  20. After peer recovery processing is complete, you must remove this additional entry before the failed server is restarted

    在對等處理結束后,必須添加的條目然後重啟服務器。
分享友人