key to disk 中文意思是什麼

key to disk 解釋
鍵盤磁盤結合輸入器
  • key : n 1 鑰匙。2 要害,關口,要沖。3 關鍵,線索,秘訣;解法。4 (外國書的)直譯本,圖例,題解,圖解,...
  • to : adv 到某種狀態;〈特指〉到停止狀態;關閉。 ★也常和動詞結合,略去其後賓語,而構成成語: The door i...
  • disk : n 1 圓盤;盤狀,盤狀物。2 【體育】鐵餅;〈美國〉唱片。3 【植物;植物學】花盤;【動物;動物學】盤...
  1. When we designed the system, we considered some key factors such as the system must deal with and store a great deal video and audio data, the capability of the hard disk in the server and client, hi the part of video compression, we choose the currently mpeg - 4 video constringent card to complete the collecting and compression of the video and audio signals

    在論文研究與實用系統設計中,充分關注到大量視音頻數據的處理、存儲以及服務器和遠程客戶端的硬盤容量等關鍵因素,視音頻壓縮採用了最新的mpeg - 4視音頻壓縮卡進行視音頻信息的採集和壓縮。
  2. For this reason, the ultrahigh density optical disk data storage technologies based on the solid immersion lens technology and the sb film super resolution technology, which appear more promising to industrialize in the short term, have been studied in this paper. the aim of this paper is to develop the key technologies for next generation optical disc data storage system

    本文圍繞超高密度光盤數據存儲技術中的固體浸沒透鏡存儲技術以及基於sb多層膜的介質超分辨高密度光存儲技術展開研究,其目的在於通過對這兩種最接近實用化的近場高密度光存儲技術的研究,掌握和發展下一代超高密度光存儲設備的關鍵技術。
  3. Key is used to create sun disk labels

    鍵用於創建sun磁盤標簽。
  4. Introduction : pink fled series of articles room, searching for clues to escape the room ! operations guide : mouse control related tip : pillows : number two, the paper on a part of your bed : 4 under a bed two figures : nine figures a drawer chests : key figure 8, under disc drawer chests part 2 : a figure, daggers bins : digital 5, 7 stabbed demarcating the trash : figure 3. chests a key curtain : six figures, radio chests following : disk, in addition to the number 0 boxes of the other things shoul

    逃離房間系列粉色篇,尋覓線索來逃出房間吧操作指南:鼠標控制相關提示:枕頭:數字2 ,紙片上部分床底1 :數字4床底2 :數字9床頭櫃抽屜1 :鑰匙,數字8 ,紙片下部分床頭櫃抽屜2 :數字1 ,匕首垃圾桶:數字5 , 7用刀劃開垃圾桶:數字3 .床頭櫃1的鑰匙窗簾:數字6 ,收音機床頭櫃下面:紙片,數字0除了箱子里的東西其他的應該找全了
  5. Pink fled series of articles room, searching for clues to escape the room ! operations guide : mouse control related tip : pillows : number two, the paper on a part of your bed : 4 under a bed two figures : nine figures a drawer chests : key figure 8, under disc drawer chests part 2 : a figure, daggers bins : digital 5, 7 stabbed demarcating the trash : figure 3. chests a key curtain : six figures, radio chests following : disk, in addition to the number 0 boxes of the other things shoul

    逃離房間系列粉色篇,尋覓線索來逃出房間吧操作指南:鼠標控制相關提示:枕頭:數字2 ,紙片上部分床底1 :數字4床底2 :數字9床頭櫃抽屜1 :鑰匙,數字8 ,紙片下部分床頭櫃抽屜2 :數字1 ,匕首垃圾桶:數字5 , 7用刀劃開垃圾桶:數字3 .床頭櫃1的鑰匙窗簾:數字6 ,收音機床頭櫃下面:紙片,數字0除了箱子里的東西其他的應該找全了
  6. Very funny game, according to the prompt of space key disk

    很搞笑的游戲,按照提示用「空格」鍵操作即可。
  7. Introduction : very funny game, according to the prompt of space key disk

    很搞笑的游戲,按照提示用「空格」鍵操作即可。
  8. Engine and performance : two stroke air cooling engine, powerful ; key parts imported, reliable and durable ; excellent start - up performance of no less than three times ' drawing, easy and convenient to operate ; chain wheel drive, minimum power loss ; constantly variable speed and disk brake guarantee your safety

    動力性能:風冷二沖程發動機,功率強大,多種進口件組裝,性能穩定可靠,壽命長;優異的啟動性能,保證您不超過三次拉動,即可啟動發動機;採用無級變速裝置及性能優良的碟剎系統,使整車運行安全可靠,操縱方便;鏈式傳動,令功率損失減至最小。
  9. You may move the pkcs12 file to a floppy disk and keep it in safe place as a backup of your key pairs and certificate

    您亦可將該pkcs12檔案移到軟磁碟片上,然後妥為保存,以作為您的數碼證書及配對密碼匙的備份。
  10. Using the pki as the basic tools considering the security requirements in tobacco industry ’ s information work, the ctca system in no. 1 project in tobacco fields developed and the security questions solved when studying the security framework in internet environment in this paper. the main work as follows : through studied the principle of pki / ca and the technology used in pki / ca and studied the theory of private key saving and identity authentication, the paper point out a new method saving private key saving and identity authentication in usb key disk, extends internet service to wireless fields using the development to wireless telecom technology solve the safety in wireless network efficiently with wireless application protocol pki

    本文密切結合我國煙草行業信息化發展的安全需要,提出以公鑰基礎設施( pki )為基本工具,研究在internet環境下該系統的安全框架結構,研發了國家煙草一號工程安全認證系統( ctca ) ,解決了存在的安全問題,具體研究工作如下:通過對pki / ca的原理和技術的分析,和對私鑰保存和身份認證技術的研究,本文採取了usbkey盤保存私鑰與身份認證的方法。
  11. For instance, while the pc and server industries continue to consolidate around a few key companies ? ? such as dell, ibm, and hp ? ? there are many different suppliers of disk drives, printed circuit boards, semiconductor chips, and other components

    例如,雖然個人電腦和服務器產業圍繞幾家大型企業? ?戴爾、 ibm和惠普? ?不斷融合,但是仍有很多生產硬盤、電路板、晶元以及其它元件的企業。
  12. The principle of this protection technology is using an irregular formatted disk as the key, and checking the existence and correctness of this disk first to determine whether the user is legal or not when running the software

    這種保護技術的原理是利用經過不正常格式化的磁盤為key ,每次執行軟體時必須先檢查該磁盤是否存在並且正確,藉以判別是否為合法的使用者。
  13. The transaction manager also transparently escalates local transactions to distributed transactions by coordinating with a disk - based transaction manager like the dtc, when an additional durable resource manager enlists itself with a transaction. there are two key ways that the

    在附加的持久性資源管理器向某一事務登記自身時,該事務管理器通過協調dtc之類的基於磁盤的事務管理器,還以透明方式將本地事務升級到分散式事務。
  14. The " bit copy " programs can not beat it, and another point is that no one will be able to generate same key - disks, since when we make a key - point in the disk, we must use a secret code

    密鑰盤兼容性很高,不僅在普通軟驅下,在usb軟驅光軟互換軟驅並口軟驅等都能成功驗證密鑰盤。
  15. This example shows how to create a backup copy of the encryption key and save it to a password - protected file on a floppy disk

    此示例顯示如何創建加密密鑰備份副本,並將其保存到軟盤中密碼保護的文件中。
分享友人