問答器 的英文怎麼說

中文拼音 [wèn]
問答器 英文
challenger
  • : Ⅰ動詞1 (請人解答) ask; inquire 2 (詢問; 慰問) question; ask about [after]; inquire about [aft...
  • : 答構詞成分。
  • : 名詞1. (器具) implement; utensil; ware 2. (器官) organ 3. (度量; 才能) capacity; talent 4. (姓氏) a surname
  • 問答 : questions and answers問答方式 interrogation reply system; 問答練習 question and answer drills; 問...
  1. Is a program that logs onto a system for example, an irc system or a backgammon server and answers questions or plays the game

    是一個程序,可以登錄到一個系統中(例如, irc系統或西洋雙陸棋服務)並回題或進行游戲。
  2. Foreign ministry spokesperson liu jianchao s remarks on russia s suspension of its participation in the cfe treaty

    外交部發言人劉建超就俄羅斯暫停執行《歐洲常規武力量條約》記者
  3. Students love playing musical chairs. they would reed a question and answer according of the flashcard of the instrument

    孩子們非常喜愛「音樂椅」的游戲,他們會讀了題后並回,指出相對應的樂圖卡。
  4. When i was crossing into gaza, i was asked at the checkpost whether i was carrying any weapons. i replied : oh yes, my prayer book

    當我過加沙邊界的時候,在檢查點有人我是否攜帶了武,我回:是的,我的禱告書。
  5. When multiple tags are transmitting data simultaneity within reader ' s scope, that will occurs a collision. in order to resole this problem, we must use multiple access protocols

    在射頻識別系統中的閱讀作用范圍內,有多個應要求通信而發生碰撞題。
  6. Audio - visual aids, question - and - answer sessions, demonstrations and games were used to enrich and enliven the learning process

    該中心的人員藉助視聽材,以及透過環節示範和游戲等活動闡述訊息,令學習過程更充實和生動。
  7. Audio - visual aids, question - and - answer sessions, demonstrations and games were used to enrich as well as to enliven the learning process

    中心的人員藉助視聽材,以及透過環節示範和游戲等活動闡述信息,令學習過程更充實和生動。
  8. I remember one of the reporters asking me about our tasks back then, and my answer was fairly simple as our missions were all “ clean ”, like guarding ministries and banks from robbers ( with the exception of those of gilded machine guns and antiquities ), and also collecting weapons from the many abandoned military barracks and bases of the ex - iraqi army, also the supervision of arms demolishment and vehicle dismantling in pre - made dumps, and lastly supervising the training of officers and soldiers of the new security forces

    記得有記者我關於我們今後的任務是什麼,當時我的回是相當簡單的,因為我們的任務都「搞定」了? ?像護衛政府部門和銀行,使其不受劫匪騷擾(那些鍍金機槍和古物除外) ,從舊伊拉克軍隊的許多廢棄軍營和基地里收集武,同時監督武的銷毀和預先碼放拆解前的車輛,最後還有督導新安全部隊官兵的訓練。
  9. Answer " yes. " it will ask for the root password of the ssh server, and then you re home free

    " yes " ,它將向你詢ssh服務的root口令,然後您就可以任意操作了。
  10. Other exhibits included authentic meteorological instruments, games and quizzes on weather phenomena

    其餘還有各類氣象儀,推廣天氣知識的游戲及比賽等。
  11. The result of this research can be applied to many fields of natural language, such as questions classification in qa system, relations assignment, word assignment and statistic machine translation, information extraction, text classification and parsing of spontaneous speech

    本文的研究成果可以應用到自然語言的其他領域,比如:系統中句分類,機翻譯中的關系對齊、詞對齊和統計機翻譯,信息抽取,文本分類,語音識別等。
  12. The security of the signature schemes whose signatures have specific form is discussed in the random oracle model

    在隨機問答器模型下討論了簽名具有某種特定形式的簽名體制的安全性。
  13. As an example, we proof the security of schnorr signature against adaptive chosen message attack in the random oracle model

    作為一個例子,證明了schnorr簽名在隨機問答器模型下對自適應選擇消息攻擊的安全性。
  14. To guard against dns spoofing of host names in the access table, one can enter all hosts by ip address, or request that the server resolves ip addresses back to original host names to make it more difficult for someone to intercept dns requests and answer them

    要防止訪表中主機名被dns電子欺騙,可以輸入所有主機的ip地址,或請求服務將ip地址解析回原始主機名來使其他人截獲dns請求和回更困難。
  15. True and the supplied credentials are valid, the user s tracking counters for bad password answers are reset

    並且提供的憑據有效,則重置該用戶的錯誤密碼提示案計數
  16. Due to the data transmission characteristics between tags and reader, space division multiple access ( sdma ), frequency division multiple access ( fdma ) and code division multiple access ( cdma ) are applied in a limited way in rfid system. therefore, time division multiple ( tdma ) has been generally accepted. according to tdma, there are aloha protocol, s - aloha, binary - tree protocol, clipped binary - tree protocol and others

    解決這個題必須要用到多路存取法,針對射頻識別系統中閱讀與應之間的通信特點,空分多路法、頻分多路法、碼分多路法在rfid系統中應用都受到一定的限制,只能應用到一些特定的場合,一般採用時分多路法,按照時分多路法的演算法有aloha演算法、時隙aloha演算法、二進制樹型搜索演算法、修剪枝的二進制樹型搜索演算法等防碰撞演算法協議,分析了各自特點以及存在的缺點。
  17. For data integrity, it exists in two problems, external interference and collisions that multi - tags occupying a single channel and transmitting their data lead into at the same time. we use data check and anti - collision algorithms to resolve those two problems respectively

    本文分別對這兩個方面進行了研究,針對數據傳輸的完整性,主要存在兩個方面的題,外界的干擾和多個應同時佔用通道發送數據發生沖突以致碰撞,運用數據校驗和防碰撞演算法分別解決這兩個題。
  18. Finally, conclusions are that the algorithm ' s efficency of utilization is higher, requires much less slots, and veracity is better than others. so it can resolve those collisions much better that multiple tags are transmitting data at the same time within reader ' s scope. it can promote rfid applications in more fields

    最後總結得出結論:在解決碰撞過程中,動態二進制樹型搜索演算法與其他幾種演算法相比,可以使系統的吞吐率及通道的利用率更高、需要的時隙更少、準確率更高、能夠更好地解決了rfid系統中的在閱讀作用范圍內有多個應要求通信而發生的碰撞題,有助於推動射頻識別技術更廣泛的應用。
  19. The " public safety exception " to the miranda rule allows police officers to ask arrestees about weapo and other potential threats to public safety without giving the miranda warning

    案: 1 、米蘭隊規則的例外是涉及公共安全,即使沒有米蘭隊警告也允許警官詢和其他危害公共安全的物品的下落。
  20. The " public safety exception " to the miranda rule allows police officers to ask arrestees about weapons and other potential threats to public safety without giving the miranda warning

    案: 1 、米蘭隊規則的例外是涉及公共安全,即使沒有米蘭隊警告也允許警官詢和其他危害公共安全的物品的下落。
分享友人