鍵地址 的英文怎麼說

中文拼音 [jiàndezhǐ]
鍵地址 英文
key address
  • : 名詞1 [機械工程] (使軸與齒輪、皮帶輪等連接並固定在一起的零件) key 2 [書面語] (插門的金屬棍子)...
  • : 名詞(建築物的位置; 地基) location; site; ground; foundation
  1. Security, too, is a key issue for switching the traditional private nforork to vpn. security of mpls wn architectur is analyzed thorouguy in this thesis, including septheion of address space and route, hiding of the mpls core smicture, resistance of attacks, impossibi1ity of 1abe1 spoofing

    安全性是虛擬專用網能否取代傳統專用網的關,本文對mplsvpn體系結構的安全性進行了深入分析,包括空間和路由的隔離、隱藏mpls核心結構、抵抗攻擊、抵抗標記欺騙等,從而得出mplsvpn與atm framerelay具有相同安全級別的結論。
  2. Vsam arranges records by an index key, relative record number, or relative byte addressing

    Vsam通過一個索引值,相關記錄號或者相關位元組來組織記錄。
  3. The cursor keys on the remote commander unit can be used to select and call any one of three contacts, which are pre - programmed and displayed in the launcher menu

    遙控器凡上的指針可以用於選擇和呼叫三個中的任可一個.該功能已編入launcher菜單中,亦在菜單中顯示。
  4. 3. in the type the file or web page name box, enter the new destination address.

    3 .在「請入文件名稱或web頁名稱」框中輸入新的目標
  5. ( c ) propose the scheme to implementing the coder and deoder of optical time - spreading / frequency - hopping, by assigning two orthogonal codes for one user and using these two codes to encoding 1 and 0 respectively, differential detection can be adopted. not only improves system performances in ber, but also resists the interference such as mai, and does n ' t need any control devices to evaluate the optimum decisive threshold

    通過給每個用戶指定互相關為0的兩個碼分別發送1和0信號以及在接收端採用差分檢測技術,避免了ook (開關控)光通信系統中0不發送光脈沖和ook常規檢測方式下最佳判決門限必須根椐用戶數等外界環境而改變,從而提高了系統性能和降低了系統的復雜度。
  6. In an indirectly addressed file, a record whose key randomizes to the address of a home record

    在間接編文件中,其關字隨機化成起始記錄的一種記錄。
  7. Hyperlinks in e - mail messages allows you to type or copy a hyperlink address in the text box of a message and have outlook automatically create the link from the text

    超級鏈接在電子郵件中,允許您在郵件的文本框中入或復制超級鏈接, outlook可自動從該文本中創建鏈接。
  8. Hitting f4 - key directly starts emulation, and stops when reaching the code window cursor. the break address is not memorized, ie. it is used only once

    通過f4可以直接啟動調試器,並會在到達編碼窗口的游標處中斷運行,那個中斷不會被記錄下來。只能使用一次。
  9. Immediately, hundreds joined in the attack. " let ' s use our keyboard and mouse in our hands as weapons, " as one person wrote, " to chop out the heads of these adulterers, to pay for the sacrifice of the husband. " within days, the hundreds had grown to thousands, and then tens of thousands, with total strangers forming teams to hunt down the student ' s identity and address, hounding him out of his university and causing his family to barricade themselves inside their home

    很快,數百人加入了攻擊. "讓我們用我們手中的盤和鼠標作為武器, "正如一個人所寫的, "來砍下這些通姦者的頭顱,以作為這位丈夫的祭品. "幾天之內,數百人增長到了數千人,然後數萬人,大量陌生人形成了窮追這個學生身份和的團隊,把他逐出了他的大學,並導致他的家人躲在他們的家裡
  10. Product characteristic : vmate entire, function table model keyboard ; peleco " d p " agreement, baud rate 4, 800, peleco " p " agreement, baud rate 2400rj - 45 connection ; the three dimensional rocking bar may carry in the accuracy control keyboard to quick ball each kind of speed the pressed key to be allowed to choose the camera the address ; transfer ball machine function menu ; processing pre - placed position ; opens and closes the small aperture ; focal variation and focusing lens ; the start stops automatic and the random scanning function

    三維搖桿可對快球的各種速度進行精確控制盤上的按可以選擇攝像機的碼調用球機功能菜單處理預置位打開及關小光圈變焦及聚焦鏡頭啟動停止自動及隨機掃描功能
  11. A method of transforming a search key into an address for the purpose of storing and retrieving items or data. the method is often designed to minimize the search time

    為存儲和檢索數據項或數據,把搜索關字轉換為一個的一種方法。該方法常用於減少搜索時間。
  12. If the search is time - critical, a binary search or hash table lookup is almost always best, but as with sorting, you must keep locality in mind

    如果搜索是時間關的,二進制搜索或者哈希表查找幾乎總是最好的,但是與排序一樣,必須記住
  13. Please be sure not to add extra spaces. you will need to type in your username and activation number on the page that appears when you visit the url

    請注意不要(在中)留空格。在此頁你需要入你的用戶名和密碼以及激活身份號碼(來激活帳戶) 。
  14. In this article, we introduce the mode of " gsr + l3 + ma " to construct broad - band ip man via ethernet technology. in order to achieve a manageable man, we analyzed and solved several key issue, such as routing layout ip address distributing customer accessing authentication and accounting vlan applying the robust network quality of service network security network administration, etc. i have participated in longyan man construction

    本文利用以太網技術,採用「線速路由器gsr +路由交換機l3 +多業務接入設備ma 」的組網模式,通過分析並解決了路由規劃、 ip分配、業務接入、認證與計費方式、 vlan運用、網路的魯棒性( robust ) 、服務質量( qos ) 、網路安全、網路管理等關問題,建設可運營、可管理的寬帶ip城域網。
  15. In both cases we can derive data dependences from reaching definitions and uses information obtained by data flow analysis. at schedule time true register dependencies are known, so register analysis does not involve any complication. but for memory dependencies we have to deal with the problem of aliasing ( addresses are computed during execution )

    而對于存儲器訪問指令而言,其相關性分析則相對復雜得多,關問題是必須解決存儲器訪問的別名問題( aliasingproblem ) ,即必須判斷出對存儲器的兩次訪問是否針對同一個單元,然後在此基礎上進行存儲器訪問的數據相關性分析。
  16. In vsam, a collection of items used to sequence and locate one or more data records in a base cluster. each alternate index record contains an alternate key value and one or more pointers. when the alternate index supports a key sequenced data set, each data record ' s prime key value is the pointer. when the alternate index supports an entry sequenced data set, the data record ' s rba value is the pointer

    在虛擬存儲存取方法( vsam )中,用於定序和定位基簇中的一個或多個數據記錄的項的匯集.每個備用索引記錄包含一個備用關字的值和一個或多個指針.當該備用索引支持某個關字順序數據集時,每個數據記錄的主關字值就是這種指針.當該備用索引支持某個輸入順序數據集時,該數據記錄的rba (相對位元組)值就是這種指針
  17. A technique, by which the range of keys for an indirectly addressed file is reduced to smaller ranges of addresses by some method of computation until the desired address is found

    一種技術,即通過某種計算方法將間接編文件的關字范圍縮小到較小的區域,直至找到所需要的為止。
  18. The program design of multi - layer keyboard in intelligent instruments are illuminated through introducing keyboard status transfer diagram, keyboard program status table, status input address pointer table and analysis program status table

    摘要復雜智能儀表的功能豐富、參數繁多,經常用狀態分析法來分析設計盤程序,文中通過實例介紹盤狀態轉移圖、盤程序狀態表、狀態入口指針表和分析程序狀態表的設計來具體說明智能儀表中多層次盤程序設計。
  19. The key is deriving the desired endpoint address dynamically

    在於要動態派生所需要的端點
  20. For the returning customers, you have the choice of using a previously stored address or entering a new one to send gift to your friends

    舊顧客在購物時,可選擇想要的收貨,您可選擇使用先前檔案里的,或是在下訂單時,入新將訂購的商品送給朋友。
分享友人