被存儲數據 的英文怎麼說

中文拼音 [bèicúnchǔshǔ]
被存儲數據 英文
stored data
  • : Ⅰ名詞1 (被子) quilt 2 (姓氏) a surname Ⅱ動詞[書面語]1 (復蓋) cover; spread 2 (遭受) suffe...
  • : 動詞1 (存在; 生存) exist; live; survive 2 (儲存; 保存) store; keep 3 (蓄積; 聚集) accumulat...
  • : Ⅰ動詞(儲藏; 存放) store up; save; keep [have] in reserve Ⅱ名詞1. (繼承人) heir 2. (姓氏) a surname
  • : 數副詞(屢次) frequently; repeatedly
  • : 據Ⅰ動詞1 (占據) occupy; seize 2 (憑借; 依靠) rely on; depend on Ⅱ介詞(按照; 依據) according...
  • 存儲 : [計算機] memorizing; storage; memory; store
  • 數據 : data; record; information
  1. In the application. cfm file, this variable is declared to the data source in db2, where our data is stored

    在application . cfm文件中,這個變量聲明為db2中的源,這里也是的地方
  2. Among all the techniques and methods protecting data, it is the most practicable to encrypt data and store encrypted data, because even if encrypted data are filched, copied, or peculated, attackers are incapable of understanding these data in that they are incapable of decrypting these data

    在目前的技術條件下,保護和信息最行之有效的方法就是將它們加密后再庫中,因為加了密的和信息,即使竊取、拷貝、截獲,獲取者因無法破解竊取的密文而無從知曉它們對應的機密
  3. Anything ( a program, letter, digital, photograph, song, etc ) stored on a storage medium is referred to us as a file, data files are also sometimes called documents, when you save a document just created ( such as a memo or letter in a word processing program ), it is stored in a new file on the designated storage medium, during the storage process, the user is required to give the file a name, called a filename, that name is used when the user required to see the document at a later time, naming files and retrieving stored document are discussed further in other textbooks

    任何(節目,信件,字式,相片、歌曲,等)放在介質指我們文件,文件有時也叫做文件,當您保一個文件創造(譬如一封備忘錄或信件在文字處理程序) ,它放在一個新文件在選定的介質,在貯過程期間,用戶必需給文件名字,稱文件名,名字使用當用戶要求看文件在最新時光,名字文件和檢索的文件談論進一步在其它課本。
  4. But be warned the phones entire phone memory will be erased including any phone book entries that are saved within the phone memory

    將會清空?要備份好所有的那些保在機身空間的(比如電話簿、通訊錄之類的) ?
  5. 3. as there are up to 106 managed objects on element level of tmn ( telecommunications management network ) in telecommunications network, and the scheme to collect management information affects the performance of network management, a new algorithm - saa ( self - adaptive algorithm ) used for retrieving multi objects information has been put forward in this thesis. saa can adjust the retrieving objects and interval of retrieval self - adaptively by using the schemes of self - adaptivity, fault tolerance, recognition status of object dynamically etc., and thus can use fewer network resources without alteration of snmp ( simple network management protocol ), iiop ( internet inter - operability protocol ) or cmip ( common management information protocol )

    針對傳統的定時提取網路管理信息方法的不足,提出了一種提取多管理對象信息的新演算法? ?自適應演算法saa ( self - adaptivealgorithm ) ,該演算法能在不改變管理協議,如iiop ( internetinter - operabilityprotocol ) 、 snmp或cmip ( commonmanagementinformationprotocol ,公共管理信息協議)的情況下,採用自適應策略、容錯策略、動態識別管對象狀態策略、管對象空間的動態刷新策略,根本次訪問管國防科學技術大學研究生院學位論文對象所得出的網路通信量,自適應地調整下次應該訪問的管對象和讀取管劉?象的時間間隔,從而可以較少地消耗所用的網路帶寬和cpu資源。
  6. The essence of edid is to set up a normal behavior fuzzy sub collection a on the basis of watching the normal system transfer of the privilege process, and set up a fuzzy sub collection b with real time transfer array, then detect with the principle of minimum distance in fuzzy discern method the innovation point of this paper is : put forward the method of edid, can not only reduce efficiently false positive rate and false negative rate, also make real time intrusion detection to become possibility ; have independent and complete character database, according to the classification of monitoring program, design normal behavior and anomaly behavior etc., have raised the strongness of ids ; use tree type structure to preservation the character database, have saved greatly stock space ; in detection invade, carry out frequency prior principle, prior analysis and handling the behavior feature of high frequency in information table, have raised efficiency and the speed of detection, make real time intrusion detection to become possibility ; have at the same time realized anomaly intrusion detection and misuse intrusion detection, have remedied deficiency of unitary detection method

    這種方法的實質是在監控特權進程的正常系統調用基礎上建立正常行為模糊子集a ,用檢測到的實時調用序列建立模糊子集b ,然後用模糊識別方法中的最小距離原則進行檢測。本文的創新點是:通過對特權進程的系統調用及參序列的研究,提出了基於euclidean距離的入侵檢測方法edid ,不僅能有效降低漏報率和誤報率,而且使實時入侵檢測成為可能;設計有獨立而完整的特徵庫,根監控程序的類別,分別設計正常行為、異常行為等,提高了檢測系統的強健性和可伸縮性;特徵庫按樹型結構,大大節省了空間;在檢測入侵時,實行頻度優先原則,優先分析和處理信息表中的高頻度行為特徵,提高檢測的速度和效率,使實時入侵檢測成為可能;同時實現了異常入侵檢測和誤用入侵檢測,彌補了單一檢測方法的不足。
  7. Icann requires every registrar to maintain a publicly accessible whois directory displaying all contact information for all domain names registered

    Icann要求所有域名的注冊資料是正確的,並在一個公開的,可公眾查閱的whois庫中。
  8. These line feed characters can affect how the encrypted data is stored or displayed

    這些換行字元會影響到加密和顯示。
  9. ( l ) it is very important for the state repair of diesel enging in our country ; ( 2 ) it will help with the more accurate decicision of repair cycle of the engine ; ( 3 ) it will improve the combustion state of the diesel enging and will keep the oil comsume at a lower level, at the same time, it lessens the dilute of the lubricanting oill in the engine. there are still some more research work to do, for it is just the begining. the mathematic model should be made and more accurate data rule should be established

    ( 1 )為推行內燃機車狀態修做準備,這在跟蹤國際機車檢修先進技術上有著十分重要的意義; ( 2 )為更合理制定內燃機車的檢修周期提供實驗分析方法和,試驗作為每臺柴油機的技術資料,藉助計算機軟體系統可以輔助制定機車的檢修計劃,使機車的檢修工作更科學合理; ( 3 )提高機車質量,降低檢修費用; ( 4 )改善柴油機燃燒狀態,降低燃耗,節約運營成本,同時,可以減少燃油滴漏,降低滑油消耗。
  10. Refers to the context of stored data the data s " scope " ; and the proper handling of scope is at the heart of stateful web application design

    指的是被存儲數據的上下文(即該的「作用域」 ) ;對作用域的適當處理在有狀態web應用程序的設計中處于核心地位。
  11. The data is then stored on a computer network which other pubs and clubs in the scheme can access so that information on louts can be passed on quickly

    這些隨后會在一個電腦網路中,實施該計劃的其他酒吧和俱樂部可以對這些資訊進行查詢,這樣一些酒後滋事者的資訊就會很快掌握。
  12. The main characteristics of broker are as follows : 1. this paper presents a novel implementation model of mvc pattern called bmvc - smvc, which is mainly working on browser. it reduces the data transferring quantity and web server loads effectively by using controller, model engine and control library of javascript in the web page, with which web server acts as storing data and using the view template, controller and model script to cooperate

    Rms系統由控制端viewer ,控端hoster ,控制服務器broker和通信服務器relay四個部分組成,本文完成了viewer 、 relay 、 hoster之間通信隧道的建立,並主要對broker服務器進行了研究與實現,本文的主要特點為: 1 、提出了一種以瀏覽器端為主的mvc模式的新實現模型bmvc - smvc該模型在瀏覽器顯示的頁面中加入javascript編寫的controller 、 model引擎和控制項庫; web服務器則主要扮演一個和通過view模板、 controller和model腳本與瀏覽器合作的角色,從而有效降低了網路傳輸的量,大大減輕了web服務器的處理負荷。
  13. A certain amount of cpu resource is used to compress the data before it is stored, and then to decompress the data when it is read from the external storage device

    之前壓縮,以及在從外部設備讀出時將解壓,這都需要使用一定的cpu資源。
  14. With the earth system grid, data is stored at different administrative sites and different organizations

    在earth system grid中,到不同的管理站點和組織中。
  15. From that point forward, data associated with the user s id is stored and can be accessed by the system as needed

    從那一刻開始,與該用戶的id相關的便起來,並且在需要的時候系統可以訪問這些
  16. In dpcx, one of two parts of a relative data set that does not have to be stored contiguously with the other extent, but must contain contiguously stored records

    在操作系統dpcx中,相關集的兩部分之中的一部分,它不必在相鄰的區域內,但必須含的是相鄰的記錄。
  17. A dynamic buffer using segmented storage ? i. e., a list of segments that new segments are added to if needed for expansion, and removed if needed when data is deleted

    採用分段的動態緩例如,一列段,如果需要擴展時,新的段就加入,需要刪除時就移除。
  18. Egl will generate code such as java or cobol, but the user still needs to provide information like the java package name to be generated, the target operating system, database name, etc. these specifications are stored in the build descriptor part controls

    Egl將生成諸如java或cobol的代碼,但用戶仍需要提供一些信息,比如要生成的java包的名稱、目標操作系統、庫名稱等等。這些規范在構建描述符部件控制中。
  19. Although view state stores data in a hashed format, it can still be tampered with

    雖然視圖狀態以哈希格式,但它可以篡改。
  20. Those pictures were added to a database and indexed by distinguishing features that can be cross referenced to pictures sent in by users

    這些照片庫中,並用一些明顯的特徵作為索引供用戶檢索。
分享友人