訪問日誌文件 的英文怎麼說

中文拼音 [fǎngwènzhìwénjiàn]
訪問日誌文件 英文
log file access
  • : 動詞1. (訪問) call on; interview; visit 2. (調查; 尋求) inquiry into; seek by inquiry [search]; try to get
  • : Ⅰ動詞1 (請人解答) ask; inquire 2 (詢問; 慰問) question; ask about [after]; inquire about [aft...
  • : Ⅰ名詞1 (太陽) sun 2 (白天) daytime; day 3 (一晝夜; 天) day 4 (泛指某一段時間) time 5 (日...
  • : Ⅰ名詞1 (字) character; script; writing 2 (文字) language 3 (文章) literary composition; wri...
  • : Ⅰ量詞(用於個體事物) piece; article; item Ⅱ名詞1. (指可以一一計算的事物) 2. (文件) letter; correspondence; paper; document
  • 訪問 : visit; call on; interview; access; addressing; reference to
  • 日誌 : daily record; journal
  • 文件 : 1 (公文、信件等) document; file; papers; instrument 2 [自動化] file; 文件保護 file protection; ...
  1. These modules provide interfaces to be used directly from userspace : raw character access, raw block access, ftl flash transition layer - a type of filesystem used on flash, and jfs or journaled file system - which provides a filesystem directly on the flash rather than emulating a block device

    這些模塊提供從用戶空間直接使用的介面:原始字元、原始塊、 ftl (閃存轉換層, flash transition layer用在閃存上的一種系統)和jfs (即系統, journaled file system在閃存上直接提供系統而不是模擬塊設備) 。
  2. The sql server 2005 database engine sets file access permissions on the physical data and log files of each database to specific accounts

    Sql server 2005數據庫引擎為特定帳戶設置了對每個數據庫中的物理數據和權限。
  3. This thesis discusses the research and development on some critical parts in airspace management and evaluation system, including mainly the following contents : design the architecture of airspace management and evaluation system. design and realize the event log middleware and event log module based on middleware technology. design and realize the core and nodus of airspace management and evaluation system - airspace data access based on object oriented technology and nested table technology

    對空域管理與評估系統的一些關鍵題進行了研究和開發,主要包括以下幾個方面的內容:設計空域管理與評估系統的體系結構提出並實現了基於中間技術的中間維護模塊採用面向對象技術和嵌套表技術設計和實現了空域管理與評估系統中的核心和難點? ?空域數據
  4. During designing and implementing system, the following problems are also solved, controlling sharing access, creating performance log file, maintaining performance information

    另外,在系統的設計、實現過程中還解決了性能數據的維護方式和共享控制,以及性能的生成、性能分析的輔助處理等多項題。
  5. Because of the differences between the client ' s data and the server ' s data of the users " browsing behavior, we must modify the path - analysis algorithm on server to meet the requirement of the recent application environment

    由於客戶端記錄的用戶行為數據和服務器端中自動記錄的用戶行為數據之間存在很多差別,因此原有的基於服務器端的路徑挖掘方法必須經過一定的改造,才能適合當前客戶端的應用環境。
  6. For the backup jobs and copy jobs to succeed, they must have access to the log shipping backup folder

    若要使備份作業和復製作業成功,它們必須都能傳送備份夾。
  7. For example, for purposes of this article i created an xml representation of an approximately 1 megabyte apache access logfile

    例如,出於本目的我創建了一個大約一兆位元組的apache訪問日誌文件的xml表示。
  8. To prevent such problems from occurring, websphere application server uses network file locking technology to ensure exclusive access to recovery log files

    要避免這樣的危險發生, websphere application server使用網路鎖定技術來確保對恢復的排它
  9. When you are detaching or attaching a database, the database engine tries to impersonate the windows account of the connection performing the operation to guarantee that the account has permission to access the database and log files

    分離或附加數據庫時,數據庫引擎嘗試模擬執行該操作的連接的windows帳戶,從而保證該帳戶具有數據庫和的權限。
  10. This module is in charge of the form and organization of the log record, log page and log file. this module is also used to control the concurrent access of the log records and provides rapid read / write to the upper level

    管理模塊設計記錄、頁以及的格式和組織方法;該模塊同時管理多個服務線程對記錄的並發,並且向上層提供快速讀寫的介面。
  11. File locking is used to ensure exclusive access to the files that make up a recovery log

    使用鎖定確保對組成恢復的排它
  12. On windows 2000 you can benefit from this service if the application event log shows event id 1000 where the message text indicates that the profile is not unloading and that the error is " access is denied "

    在windows 2000中,如果應用程序事顯示事id 1000 ,其中消息本指示配置未卸載且錯誤為「拒絕」 ,那麼可從此服務中獲得幫助。
  13. When enabled, text log files are generated whenever an application accesses the cli driver

    啟用時,無論應用程序何時cli驅動程序,都將生成
  14. To maintain the integrity of a recovery log file, only a single client process can access the log at a time ; this access can be assured using the exclusive network file locks discussed previously

    要保持恢復的完整性,一次只能允許單個客戶端流程對其進行。通過使用先前討論到的排它網路鎖定來確保的進行。
分享友人