第二名字 的英文怎麼說

中文拼音 [èrmíng]
第二名字 英文
nomen
  • : Ⅰ助詞(用在整數的數詞前 表示次序) auxiliary word for ordinal numbers Ⅱ名詞1 [書面語] (科第) gr...
  • : Ⅰ數詞(一加一后所得) two Ⅱ形容詞(兩樣) different
  • : Ⅰ名詞1 (名字; 名稱) name; appellation 2 (名聲; 名譽) fame; reputation 3 (名義) name 4 (姓...
  • : Ⅰ名詞1 (文字) character; word 2 (字音) pronunciation 3 (字體) form of a written or printed ...
  • 第二 : 1. (序數) second 2. (姓氏) a surname
  1. The following night they passed through the strait of bab - el - mandeb, which means in arabic the bridge of tears, and the next day they put in at steamer point, north - west of aden harbour, to take in coal

    這個,阿拉伯文的意思是「流淚之門」 。天是14號,蒙古號停泊在亞丁灣西北的汽船岬,因為要在那裡加煤。
  2. On the penultimate blank page of a book of inferior literary style, entitled sweets of sin produced by bloom and so manipulated that its front cover came in contact with the surface of the table with a pencil supplied by stephen stephen wrote the irish characters for gee, eh, dee, em, simple and modified, and bloom in turn wrote the hebrew characters ghimel, aleph, daleth and in the absence of mem a substituted goph, explaining their arithmetical values as ordinal and cardinal numbers, videlicet 3, 1, 4 and 100

    在用低俗文學體裁寫的一本題偷情的快樂的書是布盧姆掏出來的,他擺得很巧妙,使封面和桌面接觸那底封前倒數張空白襯頁上,斯蒂芬用一管鉛筆斯蒂芬提供的以簡略體與裝飾體寫下相當于g a d m的愛爾蘭語母117 。布盧姆則寫下希伯來母ghimel aleph daleth和qoph這是用來代替所缺的mem的。他還說明,這些母作為序數及基數的算數值,各自代表三一四及一百118 。
  3. The structure of this paper goes like this, the first chapter introduce the development of e - b / l in practice and in laws. and draw a conclution that the electrification of the b / l is a history tide. in the second chapter, on the basic of reseach the security trap in e - b / l running, 1 conclude six security elements of, e - b / l : the liability of the system, the authenticity of dealers ' identity. the integrity and secrecy of electronic data, and the validity and evidence effectiveness of electronic data. from the third chapter to the eighth, 1 reseach these elements one by one. the third chapter introduce the establishment of the e - b / l security system, and some related laws the fourth chapter introduce the certification authority of e - b / l. in the fifth chapter, 1 introduce the encrypt of electronic information and some countries ' control on use / import / export crytography. the sixth chapter introduce the concept and principle of digital signature, and reseach some related legal issues. the seventh chapter reseach the legal demand of validity, then come to a conclution that to establish a independent electronic information system is necessary. in the eighth chapter, 1 reseach some countries " regulation on the evidence effectiveness of electronic data

    章在分析電子提單運作中的安全隱患的基礎上,歸納出其六大安全要素,即系統的可靠性、交易者身份的真實性、數據電訊的機密性和完整性、數據電訊的合法有效性以及交易者行為的不可抵賴性。三章到八章分別對這六大要素進行分析:三章介紹了電子提單網路安全體系的建立以及系統安全保護法規,四章則介紹了電子提單的安全認證機構,五章介紹了信息加密技術以及各國立法對密碼技術的進出口及使用的控制,六章介紹了數的概念及原理,並以bolero為例介紹了數的技術方式,對有關法律問題作了論述;七章首先論述了電子提單對有效性的法律需求,然後結合國內法和國際規則的規定論證了數據電訊制度產生的必然性;八章通過對各國立法對電子證據的法律效力的規定,論述了對電子交易至關重要的數據電訊的不可抵賴性。
  4. In america, the electronic signature legislation began with utah in 1995, utah digital signatare act is confined to regulate digital signature which is made by using cipher code, then, other states are also engaged in legislative activities to regulate digital signature, but the second state ( newyork ) has adopted a more common way in technology, in other words, the later legislation changed from concentrating on the concrete technolngy of digital signature to more widely regulating the common technology of all kinds of electroncc signature

    在美國,電子簽立法始於1995年的猶他州,該州法案只限於調整使用密碼的數。之後,其他州也開始了數立法活動,但個進行此種立法的州(即紐約)採取一種技術上更為一般的方式,換言之,其後的立法從「集中於數的具體技術法律轉向廣泛調整各種電子簽的一般技術法律。 」
  5. The trajectories of their, first sequent, then simultaneous, urinations were dissimilar : bloom s longer, less irruent, in the incomplete form of the bifurcated penultimate alphabetical letter who in his ultimate year at high school 1880 had been capable of attaining the point of greatest altitude against the whole concurrent strength of the institution, 210 scholars : stephen s higher, more sibilant, who in the ultimate hours of the previous day had augmented by diuretic consumption an insistent vesical pressure

    他們人那起初有先有后,繼而同時撤出去的尿的軌道並不相似。布盧姆的較長,滋得沒那麼沖,形狀有點像那分叉的倒數母185 ,卻又有所不同。敢情,他念高中最後一年一八八0的時候,曾有本事對抗全校百十學生擰成的那股力量,尿撒得比誰都高。
  6. Virtual world second life, where people represented by animated proxies interact in digitized fantasy settings, is the final social networking property in the zeitgeist top ten

    人生」虛擬社區列「十大熱門搜索排行」十位, 「人生」社區是一個數化的虛擬世界,社區用戶都有一個動漫化身。
  7. Jackie would also return to america in 1981 and 1984 to fill a small role as a japanese driver in the cannonball run films

    羅維希望把成塑造成個李小。而成這個,就是在那時候改的。
  8. William used to say that he d seen a man look a fool a good many times, but never such a fool as that bull looked when he found his pious feelings had been played upon, and twas not christmas eve. . yes, william dewy, that was the man s name ; and i can tell you to a foot where s he a - lying in mellstock churchyard at this very moment - just between the second yew - tree and the north aisle

    威廉曾經說過愚蠢的人他見得多了,但從沒有見過那頭公牛發現那天原來不是聖誕節而自己虔誠的感情受到欺騙時那種傻樣的對了,威廉杜伊,這就是那個人的這陣兒他埋在梅爾斯托克教堂院子里,什麼地方我都能說得一點兒不差他就埋在教堂北邊的走道和棵紫杉中間那塊地方。 」
  9. According to provisional statistics released by the office of the commissioner of insurance for the first six months of 2006, manulife ranks second in terms of in - force non - single - revenue premiums in the long - term individual - insurance market

    保險業監理處公布的零零六年上半年香港保險業臨時統計數顯示,宏利在長期個人保險業務市場以有效保單非整付保費計算排
  10. In this case, the first method would obtain the value of the header field by specifying its index in the result set and the next one would retrieve a header field value by looking up its key by name

    在這種情況下,一個方法將通過指定結果集中的索引獲得頭欄位的值,個方法通過用查詢鍵來獲得頭欄位的值。
  11. On the theoretical basis above, we achieve an secure electronic exchange system based ssl protocol, which use object - oriented programming design, cryptography technology and com technology. we put forward a new model - scm ( secure component model ) in our system design, which realizes a two levels authentication system by using user ' s password authentication and the public key cryptographic digital signature authentication together ; which realizes stronger and selectable encryption algorithms ; which realizes information integrity and non - repudiation. at the same time, we explore a new way which combine com and cryptography technology to implement secure electronic exchange

    依據上述理論基礎,採用面向對象的程序設計方法,在ssl協議的基礎上,探索了利用com組件技術實現一個安全電子交易的次加解密組件系統。在對系統的設計中提出了安全組件模型( scm ) ,該模型提供兩層認證機制和瀏覽器web服務器雙向身份鑒別。即一通過用戶口令驗證;利用雙方的公鑰數證書對握手連接信息進行數驗證。
  12. The generic and specific names are in latin and are printed in italic type

    是種加詞,表示該物種的具體種
  13. The locomotive of the horonai railway named the name of famous person in japanese history

    它是幌內鐵道的號機車,叫"辦慶benkei " 。
  14. The second organization is used for larger directories and represents each directory as a b tree keyed on name

    種組織用於較大的目錄,用按鍵控的b +樹表示每個目錄。
  15. Hancock wrote his name in big, bold letters that day, acting as president of the second continental congress. do you think he may have practiced writing his signature

    擔任次大陸會議的主席,約翰?漢考克用很大且醒目的體,寫下自己的。你想他是不是為自己的簽特別練習過?
  16. She is writing wedding invitations. after she wrote one, two, and three 12th card, she bent over the desk and tears fell down uncontrollably. i stepped forward and saw that on all the invitations, the groom s name was mine

    她要結婚了,新郎是凌,她在寫結婚請帖,一張,兩張,三張,寫到張的時候她哭了,趴在桌上眼淚完全抑制不住,我上前一看,所有的喜帖上新郎寫的都是我的
  17. In chapter 2, the main function units of the inrp protocol for the cdn routing system based on content name are summarized, then several units are deeply studied

    章中,主要討論路由技術的inrp協議模塊。 inrp協議模塊負責為用戶的內容請求建立路由。
  18. Xiao ming ' s mother has three son. the first son ' s name is da mao. the second son ' s name is er mao. what ' s the third son ' s name ? ? ? ? ?

    小明的媽媽有三個兒子。一個兒子叫大毛,個兒子叫毛,三個兒子的叫什麼? ?
  19. If your name is not in the scroll of life will be sent to the lake of fire and the second death

    如果你的沒有記錄在生命冊上,你就被扔進火湖裡,這火湖就是?蔚乃
  20. I continue on the second assignment of the temp. this removes the original temp name completely, replacing it with a new temp named for the second use

    我接下來處理該變量的次賦值,這一次用變量新的替換掉該變量舊的,新用來表現變量的個用途。
分享友人