調用標識 的英文怎麼說

中文拼音 [diàoyòngbiāozhì]
調用標識 英文
invoke id
  • 調 : Ⅰ動詞1 (配合得均勻合適) harmonize; suit well; fit in perfectly 2 (使配合得均勻合適) mix; adju...
  • : Ⅰ動詞1 (使用) use; employ; apply 2 (多用於否定: 需要) need 3 (敬辭: 吃; 喝) eat; drink Ⅱ名...
  • : Ⅰ名詞1 [書面語] (樹梢) treetop; the tip of a tree2 (枝節或表面) symptom; outside appearance; ...
  • : 識Ⅰ動詞[書面語] (記) remember; commit to memory Ⅱ名詞1. [書面語] (記號) mark; sign 2. (姓氏) a surname
  • 調用 : transfer (officer) temporarily for a specific task; [計算機] call; invoking調用程序 caller; cal...
  • 標識 : [物理學] characteristic; identification; identifying標識碼 identification code; 標識位置 home position
  1. Because most stacks are the same, you don t actually have to store very much data - at most a few thousand strings - identifying call stacks and the associated numbers of instances linked to each stack

    因為多數棧都是相同的,調棧以及鏈接到每個棧的相關實例個數需要存儲的數據並不很多(最多幾千個字元串) 。
  2. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定戶的權力和責任,包括帳戶使方式、資源訪問權限、口令應以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使權限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應方面提供了基本的框架。
  3. But there are still no reports about the relationships of dnpi - like and gabaergic immunoreactive ( gad - li ) terminals with pag - like immunoreactive ( pag - li ) neurons in " zone - shaped area ". to answer these questions, we observed systemically the synaptic connections among the pv - like immunoreactive neurons, fibers and terminals and the connections between dnpi - like, gabaergic terminals and pag - li neurons using the methods of electron microscopic imrnunohistochemistry, triple - immunofluorescence histochemistry and retrograde tracing method combined with pre - embeded immunoelectron microscopic double - labeled technique

    但是目前對新發現的囊泡膜mu轉運體一dnn樣陽性終末與帶狀區內pag樣陽性神經元之間ej關系,以及谷氨酸脫發酶( gad ,是gaba能神經元和終末的特異性物)是否參與其調控作,尚缺乏系統的形態學資料。
  4. Note values in traditional tonal music are represented by symbols of various kinds, which indicate relative duration. these symbols include note heads, with the necessary stems and flags or beams

    固定音值在傳統調性音樂中不同的來表示相對時值。這些包括符頭,符干,符尾或連音線。
  5. At the root of professional theory on investment, finance, management and law, at the base of professional technological personal, our company, using web, other resource platform and the alliance service system of the company, we accept normal applications and net applications from the middle and small enterprises, we provide capital raise, financing service for the enterprises which need money, to solve the capital requiring problem of middle and small enterprises

    公司以投行、財務、管理、法律專業知為根本,以專業技術人員為基礎,運網站等互動性資源平臺及公司服務聯盟體系,面向各行業各地區中小企業,接受網際網路上申請或常規申請,為有資金需求的企業提供資金籌集、融通服務,解決中小企業發展中的資金需求問題,公司首先對融資項目進行初步評估、初步調研,確認接受服務申請,簽訂融資代理協議,內容包括:確認項目情況、執行準、執行周期、執行條件、費結構、費準、結算方式、執行方服務費額度等事宜。
  6. When a message is enqueued to a messaging system, the original caller s identity is not normally relevant

    當消息排隊到消息傳遞系統時,原始調方的通常並不會與其相關。
  7. Please note that the details of determining the data source identifiers, data source types, point information, and even the order of the api method calls vary from implementation to implementation

    請注意,確定數據源符的細節、數據源類型、指針信息、甚至api方法調的順序隨著實現的不同而有所不同。下面的
  8. You can preserve the original values during a call to the update method by first setting the

    如果已修改將該行為唯一行的欄位值,那麼當調acceptchanges后, original值將不再匹配數據源中的值。
  9. Communities must develop by themselves. dominant property should be developed vigorously and the function of all interial divisions should be discriminated to realize management and operation apart. those who take on governmental function should define expense criterion and strengthen public servant consciousness to reach a high socialization. diverse development and marketing conception are needed to those who take on operational function. also effective system and perfect mechanism are crucial to make synchronic increase on both scale and benefit

    對社區內部各業務板塊,要進一步分清職能,明晰費,區別對待,逐步實現管理職能與經營職能分開;對承擔政府職能的板塊,要明確費準,增強公僕意,使其達到相應的社會化水平;對承擔經營職能的板塊,要一業為主,多元發展,樹立市場意調整體制,完善機制,努力做強做大多元經濟,實現企業規模和效益的同步增長。
  10. A string that specifies the case - sensitive conditional compilation symbol associated with the attribute

    一個包含預處理符的字元串,該字元串使當前實例的目方法可以被調
  11. Indicates to compilers that a method call or attribute should be ignored unless a specified conditional compilation symbol is defined

    向編譯器指示,如果將指定預處理符應到一個方法,則該方法是可調的。
  12. At last the paper uses fully learning data according celts, constructs theory and methord of implementing system. the theory has two aspects : gives imprecise learning methords using rules when sequencing initially, such as introducing, narrating emphases and so on ; during the process of learning, we construct a fuzzy evaluating model using the data of scores, learning time and browsing times, and adjust scores with learning objects. then we can inference more precice learning strategy based on the result of evaluation, such as searching previous knowledge units, learning current knowledge units repeatly

    該原理主要體現在兩個方面:一是在初始編列時,根據規則的匹配與調可以實現較為粗略的教學方法指導,如一般性介紹、重點講述等;二是在過程導學當中,針對最具代表性的測驗成績、學習時間、瀏覽次數的學習效果和行為,結合學習者的預期學習目等因素進行適當的成績調整、時間改進等處理,並運模糊綜合評判的方法對學習者實施有效評價,以推理出在學習過程中較為細化的教學建議,如搜索前驅知單元、重新學習當前知單元等。
  13. The invocation identifier of the replication source server

    復制源服務器的調用標識
  14. Marks the current frame in the call stack with a special flag indicating that all preceding frames in the control flow should not be considered for access checking

    方法是一個特殊旗調堆棧的當前幀,指明控制流中所有前面的幀都不進行訪問檢查。
  15. The user can adjust the session identifier of the token

    戶可以調記的會話符。
  16. Method pushes a new logical operation identity onto the

    方法的每個調都會將一個新的邏輯操作壓入
  17. If an element of the list is not recognized as a valid table header cell an

    如果列表的某個元素未別為有效的表題單元格,則在調
  18. In the stage of training, nntcs applies labeled documents to ann for training, and the error back propagation algorithm ( bp ) is employed to adjust weights of the networks. after training, the final fixed weights are saved as knowledge of classification

    在文本訓練的時候,利記好的訓練文檔集進行網路訓練,誤差反饋演算法對網路進行權值調整,得到固定的權值作為分類知存儲。
  19. A dispatch identifier that identifies the member

    一個成員的調符。
  20. Applying the custom attribute to overwrite the default com dispatch identifier dispid

    >應自定義屬性以改寫默認com調符( dispid )
分享友人