記錄鍵 的英文怎麼說

中文拼音 [jiàn]
記錄鍵 英文
record key
  • : Ⅰ動詞1 (把印象保持在腦子里) remember; bear in mind; commit to memory 2 (記錄; 記載;登記) writ...
  • : Ⅰ名1 (用做記載物的名稱) record; register; collection; selections 2 (姓氏) a surname Ⅱ動詞1 (...
  • : 名詞1 [機械工程] (使軸與齒輪、皮帶輪等連接並固定在一起的零件) key 2 [書面語] (插門的金屬棍子)...
  • 記錄 : 1 (寫下來) take notes; keep the minutes; record; write down; log; enter; read in 2 (當場記錄下...
  1. Individual data items or records can be identified by a key or ordinal.

    單個數據項或可用關字和順序號識別出來。
  2. And in the 2002 breeding season alone, the macroscope there was able to take more than a million measurements, adding far more detail to biologists ' picture of a key scene in the life cycle of petrels

    單單是2002年的繁殖季節,這個巨視鏡到的測量值就超過100萬個,讓生物學家對海燕生命周期的這個關時刻,有更加詳細的了解。
  3. Summary sheet : straight sided serrations - internal and external

    觀察表.直邊花.內部和外部
  4. Then they timed the reactions that caused the new thymine bonds to form

    然後他們了產生新的胸腺嘧啶形成的反應。
  5. Vsam arranges records by an index key, relative record number, or relative byte addressing

    Vsam通過一個索引值,相關號或者相關位元組地址來組織
  6. One form of trojan horse programme is able to capture keystrokes typed by the user and then transmit them covertly to the fraudster

    其中一種特洛伊木馬程式能用戶在個人電腦所按的,並將取得的資料秘密地傳送給騙徒。
  7. If only critical events should be logged ; otherwise,

    如果應僅僅事件,則為
  8. Gets or sets a value indicating whether to only log critical events, such as warnings and errors, during the build

    獲取或設置一個值,該值指示在生成過程中是否僅僅事件,如警告和錯誤。
  9. Ab stract the author is engaged in the studying and manufacturing of an intelligent, capable and portable, multifuctional electrocardio monitoring equipment with aduc8 12 single - chip. microcomputer. the equipment can gather and record the electrocardio signals automatically, also can analyse it at real time, and send it out to the monitoring center through the telephone at real time or send it out by serial interfaces to computer. it use the graph display device to show the electrocardio waves and menu. cooperated with buttons, it provides amicable interface, and makes operation simple and convenient. based on the feature of the electrocardio signals, this paper also proposes a electrocardio distortionless data compression algorithm. the algorithn is simple but effective, it can process the data at real time, and the compression - ratio reaches 2 6

    所研製的監護儀能長時間採集和心電信號,同時可進行心電數據的實時分析,並可通過電話向監護中心實時發送,也可通過串列介面發送至微機。該監護儀採用圖形液晶顯示器顯示心電波形和菜單,配合按提供友好的人機界面,操作簡潔。本文還根據心電波形的特徵,提出一種心電數據的無損壓縮演算法,該演算法簡單有效,能實時實現,壓縮比達到2 6倍。
  10. According to the author, the authority control over dissertation and thesis consists of the following two parts : the establishment of standard record of names of author / tutor and university or institute, and the establishment of standard data bank of subjects, field of research and key words

    文章指出,學位論文書目規范控制工作主要包括兩方面內容:一是建立個人名稱(主要是博士、碩士研究生和指導教師) 、學位授予單位名稱(團體名稱)的規范;一是建立學科專業和研究領域名稱以及關詞規范庫。
  11. Latest trojan in the block : supports sin, both ways connection, lan bypass, very small server created by builder. keylogger, filemanager, funstuff, flipper, undetected for now

    簡介:一個少見的,服務端很小的木馬程序,可以穿過防火墻, 2種連接方式,,文件管理,開玩笑的功能,不能被查殺。
  12. When watching an instant replay, you can use the arrow keys to fwd / rew / pause / reverse the replay

    當觀看一個即時回放時,你可以使用箭頭來使象往前快進/往後快退/暫停/倒退。
  13. In an indirectly addressed file, a record whose key randomizes to the address of a home record

    在間接編址文件中,其關字隨機化成起始地址的一種
  14. Using our new behavioral detection spyware doctor can prevent these keyloggers from recording keystrokes and causing damage much sooner than keylogger blockers based on signature - dependent methods

    較之於傳統基於特徵碼偵測方竊碼密反的式取工具,使用了最新行為偵測技術的s . d將能夠阻的松輕常非止密碼竊取器記錄鍵盤敲擊定位以的成造此由及損失
  15. Or you can download any number of commercial keyloggers from sites such as cnet ' s download. com for testing. most of these will have a free trial period

    你也可以隨便下載那些商業工具來測試,這些工具大多數都可以免費試用的。
  16. It has been proven that 3rd party tools are found to contain trojan viruses and keyloggers to steal your account information to hack your account

    現在已經發現一些第三方插件里含有木馬病毒和類病毒,它們會竊取你的帳號信息從而盜號。
  17. Physical access to the hardware allows users to bypass software checks by installing keyloggers, taking away hard drives and reading them in other machines, sniffing network traffic, and so on

    通過安裝擊器( keyloggers ) 、取走硬盤驅動器並在其他機器中讀取、嗅探網路傳輸等等,對硬體物理上的訪問可以讓用戶繞過軟體檢查。
  18. Containing or using ( record ) keys ( " a keyed record ", " a keyed access " )

    含有或使用(的過程或說明,如控存取。
  19. Febrl ( freely extensible biomedical record linkage ) does data standardisation ( segmentation and cleaning ) and probabilistic record linkage ( " fuzzy " matching ) of one or more files or data sources which do not share a unique record key or identifier

    進行數據標準化(分割和清除)概率性的一個或多個文件或數據源聯接,這些聯接沒有共享一個唯一的記錄鍵或標識符。
  20. Febrl - febrl ( freely extensible biomedical record linkage ) does data standardisation ( segmentation and cleaning ) and probabilistic record linkage ( " fuzzy " matching ) of one or more files or data sources which do not share a unique record key or identifier

    進行數據標準化(分割和清除)概率性的一個或多個文件或數據源聯接,這些聯接沒有共享一個唯一的記錄鍵或標識符。
分享友人