重存取 的英文怎麼說

中文拼音 [zhòngcún]
重存取 英文
reaccess
  • : 重Ⅰ名詞(重量; 分量) weight Ⅱ動詞(重視) lay [place put] stress on; place value upon; attach im...
  • : 動詞1 (存在; 生存) exist; live; survive 2 (儲存; 保存) store; keep 3 (蓄積; 聚集) accumulat...
  • : Ⅰ動詞1 (拿到身邊) take; get; fetch 2 (得到; 招致) aim at; seek 3 (採取; 選取) adopt; assume...
  1. Dns round robin. the reason for this request is that some public time servers as listed somewhere on ntp. org are having problems with too much traffic

    這么做的原因是因為一些開放公眾的時間伺服器如被列在ntp . org中的有負載過的問題。
  2. The table will write down all about the electronic records during their life period. the content noted in the table will be the only basis on original and reality " testing of electronic records ". the major task of the second levels is to build the tight filing rules, moreover, combined the " life cycle table ", to build the test system to assure the original and the reality of the information during filing ; the assignment of the third level is to build testing and restoring measures of the original and the reality. by maintaining the media of electronic archives or building information file of electronic archives etc, electronic archives can maintain their available ^ visuak understandable during their deadline ; meanwhile, to build the safe control of the system through the workers dispersed authorization and deterring skills, to formulate the standards of the protective system, such as the standard of the basic structure of united electronic records ^ electronic archives. all of this is important to protect the original and the reality of electronic records and electronic archives

    「生命周期表」所記錄的內容將作為電子文件歸檔時檢驗原始性、真實性的唯一依據;電子文件歸檔管理層中的主要任務是要建立起嚴密的歸檔制度,同時結合「文件生命同期表」建立檢驗措施保證電子文件在歸檔過程中信息內容的原始性、真實性;電子檔案保管層中主要任務是建立電子檔案數據原始性、真實性檢驗及原始數據恢復管理措施,通過對電子檔案載體的維護、建立電子檔案維護管理的信息文檔等工作,確保在保管期限中的電子檔案保持其可用性、可性、可理解性:建立電子文件與電子檔案原始性、真實性保護體系安全控制,通過對系統工作人員授權分散化、建立用戶標識與認證技術等措施確保「保護體系」安全運行;加強「保護體系」涉及的標準與規范的制定工作,如建立統一的歸檔電于文件、電子檔案基本結構等標準對保護電子文件、電子檔案信息原始性、真實性有著要意義。
  3. Be careful indexing strings in this way, since overwriting the end of a string can cause access violations

    翻譯:小心使用字元串的索引訪問方式,因為若寫字元串的末字元可能導致出錯。
  4. For example, the epd now maintains electronic plans of the water catchment areas for every beach that it monitors. the plans are rapidly retrievable and easy to update. most importantly, they mark all potential pollution hazards clearly, and include detailed information about sewage treatment facilities in the area, noting their treatment methods and normal daily discharge rates

    例如,本署現已備監測計劃下每個泳灘的集水區電子圖則,這些圖則快捷,更新方便,最要的是圖則能清晰標示每個泳灘的潛在污染源,並涵蓋區內污水處理設施的詳細數據,包括污水處理方法和每日排放量。
  5. The study of data networking includes multiple access, reliable packet transmission, routing and protocols of the internet

    數據網路課程包含多重存取、可靠的封包傳輸、路由及網際網路通訊協定。
  6. In data security, the elimination of classified information from magnetic media to permit the reuse of the media at a lower classification level or to permit the release to uncleared personnel or personnel without the proper information access authorizations

    在數據安全技術中,從磁介質中消去保密信息,使之可新用於密級較低的場合或允許釋放給未被認可參與機密事項的人員和沒有正式的信息授權的人員使用。
  7. Based on the archives management and use situation, the technologies of automatic identification, storage and fetch are discussed. combined with storeroom state inspection, control and archives information management etc, the whole automatic process, which includes information retrieval, archives transmission, storage and fetch, is studied and designed

    本論文針對檔案管理及使用的現狀,著研究討論了檔案的自動識別與自動技術,結合檔案庫房的狀態檢測與控制以及檔案信息管理等問題,研究設計從檔案信息檢索、檔案傳輸直至檔案全過程自動化的檔案庫系統。
  8. The method and importance of scientific handling and using files are analyzed in detail. to use obturation storeroom replace open storeroom, and control the temperature and humidity of storeroom automatically, in order to extend the archives " natural life. the technologies of automatic identification, storage, fetch and agv are put forward to improve automatic level and work efficiency

    具體分析了科學管好用好檔案資料的方法與要性,提出了以密閉檔案庫房替代敞開式庫房,並自動監控庫房的溫濕度來延長檔案的使用壽命;提出了採用檔案自動識別與技術以及agv技術,來提高檔案庫的自動化程度和工作效率;採防盜、防火等措施以確保檔案庫的安全;採用c s或b s工作模式來組建檔案庫的信息管理網路。
  9. It is widely used in many circuits, such as high precise comparators, a / d and d / a converters, drams, flash memory circuits, and other analog or mixed circuits. therefore, it is significant to develop a voltage reference circuitry that is compatible with digital cmos technology and can be integrated into a system on a chip ( soc )

    基準電壓源( voltagereference )是超大規模集成電路和系統的要組成部分,應用於高精度比較器、 a d和d a轉換器、隨機動態儲器、閃電路等多種電路和電路單元,亦為系統集成晶元( soc , systemonachip )所廣泛採用。
  10. Microsoft has released a patch that resolves an issue where under a heavy system load, access to a floppy disk drive may result in the following error message : system process - no disk there is no disk in the drive

    Microsoft已發行一個修補程式,用來解決在系統負載過軟碟機可能會出現的問題。原本可能會出現以下的錯誤訊息:系統處理沒有磁片磁碟機中沒有磁片。
  11. The set of security services offered includes access control, connectionless integrity, data origin authentication, protection against replays, confidentiality, and limited traffic flow confidentiality

    Ipsec協議提供的安全服務集包括控制、無連接的完整性、數據源鑒別、反放攻擊、機密性和有限的通信量的機密性。
  12. An efficient algorithm qais is proposed that uses the efficient method to reduce database access activity, and present a novel algorithm aiu based on this algorithm, it is fit for mining association rules and incremental updating. it is especially effective in vldb, mining long patterns, and high support. the perfermance of qais / aiu is verified on the basis of synthetic data, experiments show that the proposed algorithm can mine association rules more efficiently by not generating candidate itemsets and reducing the redundancy of frequent itemsets while generating association rules

    然而目前大多數挖掘關聯規則的演算法往往必需多次掃描事務數據庫才能達到要求的目標,這樣復性的數據庫動作將會導致過多的執行時問浪費在i o動作上,另外在頻繁集生成規則時現有的演算法沒有考慮到規則的大量冗餘,為了解決這個問題本文提出了一個不需要生成候選集同時有效的去除生成規則時產生大量冗餘的演算法qais ,來提高關聯規則生成的速度,並且在此演算法基礎上提出了新穎的關聯規則增量更新演算法aiu ,通過應用合成數據驗證了qais aiu演算法的有效性,由試驗結果來看這個方法確實能更有效且準確地獲得事務數據庫的關聯規則,尤其適合挖掘超大數據庫中高支持度下長模式的挖掘。
  13. In the large family of semiconductor technology, static random access memory ( sram ) attracts much attention because of its broad applications. sram has become an indispensable member of semiconductor memory family due to its low power consumption and high - speed performance

    在隨機儲器中,除了動態儲器( dram )外,靜態儲器( sram )由於其自身的低功耗和高速的優勢而成為半導體儲器中不可或缺的一類要產品。
  14. The problem of overloaded aps can be quite severe in areas of high user density

    點負荷過的問題,在用戶密度高的區域內會變得相當嚴
  15. The thesis emphasize further research on both identity identification and authorization access based on role access control. a new identity identification protocol and a new method of access authorization are presented

    論文著對身份認證和基於角色的控制授權訪問進行了深入研究,並提出新的身份認證協議和訪問授權方法。
  16. Irlap is the link accesses protocol layer responsible for irda device discovery, retransmission, and flow control

    Irlap是負責irda設備發現、傳以及流控制的鏈路協議層。
  17. Having the dbms determine the optimal access path to the data lifts a heavy burden off the programmer s shoulders

    讓dbms確定到數據的最優路徑解除了程序員肩上沉的負擔。
  18. Erase the settings for the connection files and re - establish a connection with an access point

    為連接文件擦掉背景並且建與一個點的聯系。
  19. The paper puts forward a combined - allocation - scheme based on the idea of constrained - block - allocation at the storing allocation strategy and gives disk - striping about the storing of big capacity disk array. in the study about the access path of the multi - media data, we introduce several kinds of representative multi - dimensions data index structure including k - d tree, r tree, vp tree and so on. ( 3 ) the research of multi - media database system architecture.

    儲分配策略上根據受限塊分配( constrainedblock ? allocation )的思想,本文提出了聯合分配模式( combinedallocationscheme ) ;並針對大容量磁盤陣列的儲給出了條形分配方案( diskstriping ) ;在多媒體數據的路徑的探討中,點介紹了幾種有代表性的多維數據索引結構,有k - d樹、 r *樹、 vp樹等。
  20. Model of data remote transmittal based on ca authentication is compound by ca authentication and sensitive data security. on one hand, ca authentication is developed on the basis of openssl function libraries, which provide secure and reliable channel for sensitive data between two communication terminals ; on the other hand, sensitive data in server database is encoded by fields, which keep invisibility for non - correlation persons

    基於ca認證的數據遠程模型是我們利用基於openssl函數庫開發的ca認證過程來為通信兩端提供安全可靠的通信通道,具有信息保密、信息完整性、身份認證等功能,同時,對企業要數據欄位進行加密,來保證數據庫端的數據安全。
分享友人