file recovery 中文意思是什麼

file recovery 解釋
文件恢復
  • file : n 1 紙夾,文件夾。2 釘成冊的文件,檔案,卷宗,案卷,合訂本。3 【計算機】外存貯器,存貯帶。4 行列...
  • recovery : n. 1. 重獲;復得;恢復,收回,回收。2. 還原,復原;痊癒;蘇生;矯正。3. 回縮。4. 填地。5. 【法律】勝訴。
  1. Restore the system state from a recent backup, or use the recovery console to replace a damaged file with a clean copy

    從最近的備份中還原系統狀態,或使用故障恢復控制臺,用干凈的版本替換損壞的文件。
  2. Server p attempts to gain an exclusive file lock for this peer recovery log, but is unable to do so as it is held on behalf of server h. the peer recovery process is blocked

    服務器p試圖獲取該對等恢復日誌的排它文件鎖定,但是由於文件服務器上的nfs鎖定管理器代表服務器h持有恢復日誌文件的排它鎖定,因此阻礙了對等恢復處理。
  3. Sql server file recovery. mdf recovery

    硬盤數據恢復保密協議
  4. File restore scenarios full recovery model

    文件還原方案(完整恢復模式)
  5. Performing file restores full recovery model

    執行文件還原
  6. In non - journaled file systems, file recovery can take hours or days. most file server customers cannot tolerate the downtime associated with non - journaled file systems

    而在非日誌文件系統中,文件恢復可能花費幾小時或幾天。大部分文件服務器用戶不能容忍與非日誌文件系統相關的停機時間。
  7. It is not only important but also very difficult / this paper analyses the form and the feature and the expression of c language switch structure in executable file. a pattern. language is defined to describe the recognition pattern of switch structure boot. the design principle and the realization method are introduced about the recognition program and the recovery program of switch structure

    本文分析了c語言開關結構在可執行文件中的形式、特點和表示;定義了一種模式語言,用以描述開關結構引導區識別模板;給出了開關結構識別程序和恢復程序的設計原理及實現方法。
  8. Manual peer recovery can be used when the file system does not provide the required level of file locking support and no constraints are in place to ensure that overloading or network partitioning does not occur

    當文件系統不提供所需的文件鎖定級別支持,且沒有採取措施確保阻止過載和網路劃分發生時,可以使用手動對等恢復。
  9. To prevent such problems from occurring, websphere application server uses network file locking technology to ensure exclusive access to recovery log files

    要避免這樣的危險發生, websphere application server使用網路文件鎖定技術來確保對恢復日誌文件的排它訪問。
  10. Oracle online recovery depends a great deal on what is actually lost, for example, losing a group on online redo logs, losing a rollback segment data file, or corrumption of a data file for the system table space

    Oracle聯機恢復很大程度上取決于實際丟失了什麼,例如,在聯機重做日誌上丟失了一個組、丟失了回滾段數據文件或者system表空間的數據文件的損壞。
  11. Under the simple recovery model, file backups are essentially restricted to read - only secondary filegroups

    但是,對于簡單模型數據庫而言,文件備份和文件組備份實質上局限於只讀輔助文件組。
  12. Under the simple recovery model, file and filegroup backups are available only for read - only filegroups

    在簡單恢復模式下,文件和文件組備份只適用於只讀文件組。
  13. Ice ecc uses special compression techniques for storing catalogs of files. it provides the minimal size of recovery files even for large file collections

    Ice ecc對于存儲文件的目錄使用特殊的壓縮技術。即使對于大的文件集合,它也提供最小大小的恢復文件。
  14. A group of metadata servers are used to provide multiple metadata paths. we study a few key issues for cluster file systems of such architecture, including metadata distribution issue, metadata consistency and fast recovery issue, and issues in regards to pb - scale cluster file system

    針對這種結構的機群文件系統,我們研究了其中的幾個關鍵問題,包括元數據的分佈問題,元數據的一致性和快速故障恢復問題,以及pb級機群文件系統的相關問題。
  15. File locking for websphere application server recovery logs

    Websphere application server恢復日誌的文件鎖定
  16. File locking is used to ensure exclusive access to the files that make up a recovery log

    使用文件鎖定確保對組成恢復日誌的文件的排它訪問。
  17. Server h is running on host h and holds an exclusive file lock for its own recovery log files

    服務器h在主機h上運行,且對其恢復日誌文件持有排它文件鎖定。
  18. Server p is running on host p and holds an exclusive file lock for its own recovery log files

    服務器p在主機p上運行,且對其恢復日誌文件持有排它文件鎖定。
  19. Db file recovery - db file repair

    硬盤修復數據前報價
  20. At last, we apply dcds model to five applications, distributed attack, network probe, file recovery and load balance, are experimented and investigated. the initial results of our experimenting show that our dcds model and implementations are effective and feasible in practice

    針對分散式黑客攻擊、大規模病毒入侵、網路探測、文件的災難恢復和負載平衡等五種具體的應用實例,分別給出了具體實現過程及其實驗結果,實例應用結果表明,我們提出的解決問題的思路、技術方案及其實現方法是可行性的、有效性的。
分享友人