用戶不存在 的英文怎麼說

中文拼音 [yòngcúnzài]
用戶不存在 英文
no such user
  • : Ⅰ動詞1 (使用) use; employ; apply 2 (多用於否定: 需要) need 3 (敬辭: 吃; 喝) eat; drink Ⅱ名...
  • : 名詞1 (單扇的門 泛指門) one panelled door; door 2 (人家; 住戶) household; family 3 (門第) f...
  • : 名詞[書面語] (剁物所用的木墩) a block of wood
  • : 動詞1 (存在; 生存) exist; live; survive 2 (儲存; 保存) store; keep 3 (蓄積; 聚集) accumulat...
  • 用戶 : user; subscriber; consumer; party; purchasers; abonement
  1. Dry - mortar encounters large market and development interspace, due to many advantages of agility, multiformity, preservation, and adjustability

    由於干拌砂漿具有靈活性、多樣性、可儲、適應性強等優勢,可滿足同工程需要,我國具有廣闊的發展前景。
  2. Your customer and nonentity, or your forum password mistake, or your account number have beened targeted by the managing person

    您的名並,或者您的論壇密碼錯誤,或者您的帳號已被管理員鎖定。
  3. Mr chenault admits there is little cross - selling with the more upmarket card business and there have been persistent rumours that american express would spin off the financial advisers ' arm

    陳納德先生承認,面向更高收入客的信卡業務上,幾乎交叉銷售,此外,有關美國運通將把財務顧問部門分拆出去的傳聞斷。
  4. At present, the most of vtr which are used in watch - control occasion for speciality are short of a uniform control - check - alarm system, which brings on the discommodiousness of operation and the user can not know the time of occurring a fault, which reduces the reliability of the watch - control system. therefor, at first, i carefully analyze the servo theory of the vtr which had been produced by chmavc with k mechanism to find out the work rule of the control signal ; second, take out some right control signal ; then for dealing with the problem of vtr in use for watch - control, i choose some right components to design the uniform control system for many special vtr with protel software. it mainly includes the following functions : operation functions of all vtr ( for example : power, play, ff, rew, stop, rec, eject, fwd, rwd, sp, lp ) was controlled by line at the same time ; in, the process of recording, when the tape walks to the end or stops by itself, the system gives an alarm and shows the number of the wrong vtr ; in the process of recording, the system gives an alarm and shows the number of the wrong vtr when the video signal from vidicon is losed ; the system controls all vtr to record on the non - working time when there is something wrong in the guarding section ; the system controls the video from vtr to switch to right monitor

    目前,監控場合的業務錄像機普遍缺乏一個統一的控制及檢測報警系統,這就導致了操作的方便和出現了故障知道,降低了監控系統的可靠性,為此,我首先對華錄松下生產的k機芯的錄像機伺服原理進行仔細分析,找出各個伺服控制信號的控制變化規律;然後從中選出合適的控制信號;針對目前錄像機實際監控使過程中的問題,選合適的元器件;運protel繪圖軟體,設計了這個多臺業務錄像機的統一控制系統,她主要包括以下功能:錄像機操作功能(如power play ff rew stop rec eject及正尋反尋帶速設定等)的統一線控控制功能;磁帶記錄過程中,磁帶到頭和磁帶自己「偷停」的報警,並要能顯示出具體是哪一臺錄像機;記錄狀態下,攝像頭輸入信號丟失報警,並要能顯示出具體是哪一臺錄像機;休息或其他需要記錄時,一旦警戒區有情況,則控制所有機器自動進入錄像狀態的功能;從錄像機輸出的監控圖像信號對監視器的切換功能。
  5. However, there are always a large numbers of “ free - riding ” users in many well designed peer - to - peer anonymity systems, which consume the resource but do not make any contribution

    然而很多設計優良的p2p匿名通信系統中,都著大量的「搭便車( free - riding ) 」,他們獲得系統服務的同時卻願做出貢獻,造成了系統性能的降低。
  6. Care must be taken when granting authorities and privileges to a user or group, as db2 udb will let you grant those privileges to a non - existent account

    或組授予權限和特權時必須小心,因為db2 udb允許將這些特權授予的帳號。
  7. Also, memory is unprotected for user memory usage by m33 core ( only when homebrew is launched )

    當然,通過m33核心的再得到保護(僅僅是自製程序啟動的時候) (更大幾率的死機? ? )
  8. Traditional multiuser detector make good use of all signals which resuilt in multiple access interference so that it provides optimum mai resistance. ( 1 ) nevertheless, it assumes that the receiver can acquire the signature waveform and timing of desired user and the interfering users ; ( 2 ) it has no ability to suppress intercell multiple access interference ; ( 3 ) it cannot be applied in downlink channels. adaptive multiuser detector eliminates the need to know the signature waveforms and the timing of the interferes and has to need training data sequences for every active user

    傳統多檢測檢測技術基礎上,充分利造成多址干擾的所有的信息進行聯合檢測,從而具有良好的抗多址干擾能力,但一些缺陷: ( 1 )僅要求知道期望的地址pn碼及其定時信息,還要求其他干擾的地址pn碼及其定時信息; ( 2 )能消除其他相鄰小區的多址干擾對本小區的影響; ( 3 )能直接應cdma移動通信系統中的下行鏈路。
  9. Keystroke loggers are available in either software or hardware versions. they can store everything a user types without the user ever knowing they ' re even there

    擊鍵記錄者有軟體或硬體版本。它們可以知其的情況下保輸入的一切。
  10. Most pcs users don ' t need ecc memory because recent improvements in the production of memory chips have dramatically reduced the incidence of those errors

    大多數pc機需要糾錯碼儲器,因為近來儲器晶元生產中的改進,已經大大減少了這種錯誤的產生。
  11. Confirm that there are no files or configuration items that are world - writable that a guest account could leverage under these conditions

    請確認來賓帳這些條件下可以利的、全局可寫的文件或配置項目。
  12. For example, a user login may not exist on the test server

    例如,登錄名可能測試服務器上
  13. If a user login does not exist on the test server, those events in the workload that are issued by that user login may not be tunable

    如果登錄名測試服務器上,則可能無法優化工作負荷中由該登錄名執行的那些事件。
  14. In the preceding example, if directory browsing is enabled and no other restrictions are in place, all users can view non - asp. net files located in the application root directory,

    上面的示例中,如果啟了目錄瀏覽功能並且其他限制,則所有都可以查看位於應程序根目錄
  15. If the server of the email account you entered returns messages such as “ not exist ” or “ not enough space ”, then the relevant registration will be deleted by administrator immediately

    如果您填寫的郵箱所服務器返回「此郵箱」或「郵箱已滿」之類的嚴重錯誤信息,您注冊的會被管理員立即清除。
  16. Because the users are not changing data, concurrency and atomicity issues are not a concern ; the data is changed only by periodic, bulk updates made during off - hour, low - traffic times in the database

    因為更改數據,所以並發性和原子性問題;又因為數據只定期更改,所以可以非工作時間和低流量時間對數據庫進行大容量更新。
  17. I am fairly certain that, unless a lot of them get into the hands of home users and clueless business users, there won ' t be much incentive for the bad guys to begin to explore potential vulnerabilities

    我相當肯定地是,除非它們大量落到家庭和無能的企業手中,壞傢伙開始探尋潛缺陷的動機將
  18. As a practical matter, most users won t need to concern themselves with db2 s new physical storage management architecture for xml data

    實踐中,大多數需要關心db2對xml數據採的新的物理儲管理體系結構。
  19. So it is convenience for different users with different hardware preserve important data. in fact, the whole system save the important data in the register table, it is a relatively safety method in only realized by software

    這樣可以保證對同硬體需求的擴充方便,實際開發也採注冊表中保重要信息,相對來說,這是比較安全的一種軟體實現形式。
  20. A son were already deleted, the hair sticks the customer nonexistent, the son is in examine now

    帖子已被刪除、發貼用戶不存在、該帖子正審核中。
分享友人