拷貝方法 的英文怎麼說

中文拼音 [kǎobèifāng]
拷貝方法 英文
copy method
  • : 動詞(打) flog; beat; torture
  • : 名詞1 [動物學] (蛤螺等有殼軟體動物的統稱) cowry; cowrie; shellfis 2 (古代用貝殼做的貨幣) cowr...
  • : Ⅰ名詞1 (方形; 方體) square 2 [數學] (乘方) involution; power 3 (方向) direction 4 (方面) ...
  • : Ⅰ名詞1 (由國家制定或認可的行為規則的總稱) law 2 (方法; 方式) way; method; mode; means 3 (標...
  • 拷貝 : [電影] copy; replica拷貝機 letterpress; 拷貝片 print; 拷貝紙 copy paper; copying paper
  • 方法 : method; means; way; technique; process; procedure; plan; device; recipe; fashion; tool; maneuver
  1. Among all the techniques and methods protecting data, it is the most practicable to encrypt data and store encrypted data, because even if encrypted data are filched, copied, or peculated, attackers are incapable of understanding these data in that they are incapable of decrypting these data

    在目前的技術條件下,保護數據和信息最行之有效的就是將它們加密后再存儲在數據庫中,因為加了密的數據和信息,即使被竊取、被、被截獲,獲取者因無破解竊取的密文而無從知曉它們對應的機密數據。
  2. If you have more than one auxiliary lens it ' s probably best to get kmz ' s zeiss copy multi - finder

    如果你有一個以上的輔助透鏡,它的問題的最好,以獲得頻率的蔡司多媒體搜索器。
  3. If you have access to an i386 machine, you can use one of the following programs to copy images to floppies

    如果您能操作一臺i386機器,您可以使用如下之一往軟盤映像文件。
  4. If you have access to an i386 or amd64 machine, you can use one of the following programs to copy images to floppies

    如果您能操作一臺i386或amd64機器,可以使用如下之一往軟盤映像文件。
  5. For the sake of assuring the datum continuing which recorded by seismic monitoring digital apparatus, we advanced a copy method based on multithread technique combining with datum flow mode, and builded automatic backup and failing warning system, the intention of protecting the datum can be made

    摘要為了保證地震監測數字儀實時系統數據記錄連續可靠,不出故障,提出了以多線程技術結合數據流式拷貝方法,建立自動備份兼故障報警系統,達到實時保護數據的目的。
  6. Method for measuring thickness of buildup area on unitized microfilm carriers aperture, camera, copy and image cards

    整體縮微膠片承載器縮微膠片檢索穿孔卡照像機和圖像卡的安裝區域的厚度的測量
  7. Objective : construct high - level expression system of echistatin in e. coli methods : obtain amino - acid sequence of echistatin from genebank database. considering the bias of usage of 61 available aminoacid codons in e. coli, design the coding sequence of echistatin, synthesize the dna sequence chemically, get single copy coding gene and repeated two copy coding gene of echistatin. insert the sequence into expression vector pbv220, and more, we construct fusion expression clone of echistatin with pcr, identify the recombinant vector by dna sequencing

    目的構建蛇毒鋸鱗蝰素( echistatin )的原核高效表達體系由genebank數據庫檢索蛇毒鋸鱗蝰素( echistatin )的氨基酸序列,結合大腸桿菌蛋白質合成體系對氨基酸密碼子使用的偏愛性,設計了echistatin編碼基因,體外人工合成編碼基因dna片段,通過適當的限制性內切酶位點插入表達載體pbv220 ,分別構建了echistatin的單表達克隆、雙串聯表達克隆;進一步通過pcr技術構建echistatin的融合表達基因克隆。
  8. Sony bmg, one of the world ' s biggest music companies, said it was ending the use of the software provided by a third - party vendor and allowing consumers who purchased cds to exchange them for similar items without the software

    新社11月17日報道,世界最大音樂公司之一的sony bmg已宣布,公司將中止使用由第3軟體商提供的xcp擴展保護反盜版軟體。
  9. Why would experienced developers who otherwise employ good programming practices engage in copy - and - paste methods instead of creating helper libraries

    為什麼有經驗的開發者沒有使用良好的編程習慣,卻使用和粘貼而不是創建助手( helper )庫呢?
  10. When this method copies the recordset to the worksheet, the results will be truncated if you do not specify a range that is large enough to hold the contents of the recordset

    當這種到工作表時,如果不需要的特殊范圍比記錄包含的內容多,程序將被截去。
  11. Ok. this part is about how to use duplicate array to copy the curves, this is great for wheel rim profile or other duplicated with degree thingy

    這個教程是教你如何使用復制選項來曲線,這種用在做車輪的邊緣輪廓曲線或者是其它有規律的曲線是非常好的
  12. Previous species method of reproduction was simply mitosis, repeated cell division which produced new organisms, and exact copy of their ancestors

    再生產早先種類簡單地是導致新有機體的有絲分裂重覆的細胞分裂,並且他們的祖先的確切的
  13. Abstract : this paper discus sed the basic technique of setting security key and produced group security key to anti - copy and dynamic reading security key to anti digital simulation

    文摘:對軟體加密解密基本技術和分析的基礎上,提出組合加密防,動態密鑰讀取防模擬兩種
  14. In addition to the announcement made earlier today about super mario galaxy, we are pleased to confirm that we have now identified the copy protection method responsible and created a fix

    今天早些時候我們曾經發布過有關《超級馬里奧銀河》的公告,現在我們可以很高興告訴大家,我們已經找出了可以破解防系統的確切並且製作了相應的補丁。
  15. It offer us a worthwhile methods to detect and quantify low expressing gene. 6

    為我們研究低基因的表達提供一個值得試用的
  16. The archive often encounters prints and artefacts that have been damaged due to extended neglect. our conservation section is responsible for restoring those damaged films and providing a sound environment for our collection s safekeeping

    修復組肩負保管及修復影片的重任,用科學管理片倉修復電影海報劇照等也由該組負責修復。
  17. This method does not change the existing arrays, it only returns a copy of the joined arrays

    這個不會改變現存的數組,它只返回了所結合數組的一份
  18. Although the 16s rdna sequence similarity of isolate t7 with paenibacillus illinoisensis, paenibacillus pabuli and paenibacillus amylolyticus was 94 %, 95 % and 94 %, respectively, dna relatedness between isolate t7 and p. illinoisensis, p. pabuli and p. amylolyticus was 22. 32 %, 9. 14 % and 50. 62 %, respectively

    本文還從菌株g2和t1中,分別克隆了編碼p _ ( )蛋白的glnb基因,用southern雜交的驗證了g2的glnb ,結果表明在g2中可能有2個的glnb基因。
  19. If you have a compactflash jacket and a compactflash storage card sd mmc cards are not supported for this process, then by far the simplest method is to copy three files the jffs2 file, reflash. ctl, and md5sums to the root of the cf card using either wince or another computer and place the card in the jacket and the ipaq in the jacket as well, obviously

    如果您有一個compactflash盒( jacket )和一個compactflash存儲卡(此過程不支持sd / mmc卡) ,那麼最簡單的就是,使用wince或另一臺機器將三個文件( jffs2文件、 reflash . ctl和md5sums )到cf卡的根並將卡放入盒中(顯然,也將ipaq放入盒中) 。
  20. In terms of reliability, another advantage of this approach is that if copies of the sub - job are sent to machines with different architectures, we can protect ourselves against potential errors introduced by a chip architecture, operating system or compiler

    從可靠性來講,這種的另外一個優點是,如果子任務的不同被發送到不同架構的機器上,我們就可以避免由於一種晶元架構、操作系統或編譯器而引起的潛在錯誤。
分享友人