scan access 中文意思是什麼

scan access 解釋
掃描存取
  • scan : vt ( nn )1 細看,細察;審視。2 〈口語〉大略一閱;瀏覽。3 按韻節念,按句調讀,標出(詩)的格律(...
  • access : n. 1. 接近;會面。2. 捷徑,門路〈指方法、手段〉;檢查孔;進路,入口;【自動化】(存貯器的)存取。3. (病的)發作;(怒氣等的)爆發。4. 增加。
  1. Standard test access port and boundary scan architecture

    標準測試存取口及邊界掃描體系結構
  2. Test access port and boundary - scan architecture

    測試存取口及邊界掃描結構
  3. On the other hand, boundary - scan technique intelligent fault diagnostic method was applied to practice. for most digital system, devices with boundary - scan architecture are broadly used. only using four line or five line to connect pc parallel port with cut tap ( test access port ), all the ptvs can be loaded to cut and all homologous prvs can be taken back to intelligent fault diagnosis system

    至於本文採用邊界掃描測試故障診斷技術,是考慮到本系統的通用性和簡潔性,因為對于大多數數字系統而言,具有邊界掃描結構的器件己廣泛應用,本文只需4條或5條信號線就能將pc機和被測邊界掃描電路連接起來,由此極大地簡化了智能故障診斷系統中為實現ptvs加載和prvs獲取而專門設計的介面板電路。
  4. It will choose indexed access if it has lower cost than table scan

    如果使用索引的開銷比表掃描的開銷低,優化器將選擇索引訪問。
  5. Access plan directives that force the optimizer to use the designated access method for data retrieval, either sequential scan or index scan

    訪問計劃指示,強制優化器使用指定的訪問方法進行數據檢索,要麼是連續掃描,要麼是索引掃描。
  6. Most ( 90 % ) of the authors are willing to authorize libraries to scan their books for public access

    大多數作者願意圖書館在非營利條件下把自己的絕版圖書進行數字化和網路傳播
  7. In dafrm, for the purpose of providing better system performance and reducing network traffic, system nodes scan their local replicas to monitor replicas ’ access situation, and make decision independently to add, delete or migrate their replicas

    Dafrm可以根據文件讀寫訪問頻率,自動調整文件副本數量以及副本的存放位置,平衡讀寫操作對副本的不同要求,並對每個副本實現不同精度的差異化管理。
  8. In technological part, it begins with maintaining physical security, network security, system security, data security, application security and user security, and then takes proven actions, that include authentication, password checking, access control, anti - virus, firewall, leak scan, ids, security audit, anti - hacker, backup mechanism and etc. in organization sketch part, the different positions are arranged by insisting the rule of the minimum right. in management sketch part, a series of effective regulations are settled, according to the chinese governmental laws and the regulations of the agricultural bank of china. now, the plan has been preliminarily applied into the practice

    在技術層面上,從維護銀行網路信息系統物理安全、網路安全、系統安全、應用安全、用戶安全等方面出發,採用了成熟、適用的安全技術措施,包括;身份認證、密碼、訪問控制、防病毒、防火墻、漏洞掃描、入侵檢測、安全審計、防黑客入侵、同城災難備份等技術;在組織結構上,堅持權限最小化原則,設置不同的崗位,對每個崗位的安全職責進行了明確的界定;在管理體繫上,依據法律法規,制定了行之有效的規章制度。
  9. This structure not only achieves the purpose of hardware logic partition but also makes it convenient for the generation of test stimulus, fault simulation, and online debugging. furthermore, we make internal scan share the test access port, so the pin ’ s cost which brings for test is reduced

    此外為減少晶元引腳開銷,我們還把內部掃描和邊界掃描集成在一起,使其共用測試引腳,降低了因測試而帶來的晶元引腳開銷。
  10. Without an index sarg, an index scan will use the index to access the data, but will return every key in the index

    沒有索引sarg時,索引掃描將使用索引訪問數據,但是會返回索引中的所有鍵。
  11. With both stand - alone digital reader printer and pc - peripheral microfilm scanners, ms6000 takes advantage of your microfilm and microfiche in ways never before possible. it is suitable for reference collections and business applications, education, government and libraries. the microfilm scanner ms6000 can scan to pc for electronic filing and access throughout the organization

    Ms6000是一部可接駁電腦的微型縮影掃描器,接駁上獨立數碼閱讀印表機,便能使縮微膠卷及縮微平片展示出最佳效果,適合收集參考、商業用途、教育、政府及圖書館選用。
  12. Host - based scanning tools are run on each host to scan for a wide range of system problems including : unauthorized software, unauthorized weak passwords, dormant viruses, and inappropriate access permissions

    主機型掃描工具在沒個主機上運行以便掃描一個很寬范圍的系統問題,包括:未授權軟體,未授權的弱密碼,隱匿的病毒及不正當的存取許可。
分享友人