key in access 中文意思是什麼

key in access 解釋
存儲關鍵
  • key : n 1 鑰匙。2 要害,關口,要沖。3 關鍵,線索,秘訣;解法。4 (外國書的)直譯本,圖例,題解,圖解,...
  • in : adv 1 朝里,向內,在內。 A coat with a furry side in有皮裡子的外衣。 Come in please 請進來。 The ...
  • access : n. 1. 接近;會面。2. 捷徑,門路〈指方法、手段〉;檢查孔;進路,入口;【自動化】(存貯器的)存取。3. (病的)發作;(怒氣等的)爆發。4. 增加。
  1. Firstly, to accelerate the building and perfection of key networks ; for the network construction in 10 provinces in the north of china, the principles of competition first and benefit first will be applied and more emphasis will be placed on key regions and key businesses ; to speed up the construction and perfection of the emulative business network, make up for the deficiency, make the network complete and build telephone line network moderately ; according to market demand, to build and perfect broadband city network and residence access into the network

    第一,加快重點網路的建設和完善。北方10省網路建設總體上將本著競爭優先、效益優先的原則,向重點地區、重點業務傾斜。進一步加快建設和完善競爭性業務網路;搞好補缺配套,適度建設電話網;根據市場需求,建設和完善寬帶城域網和駐地接入網。
  2. In the following chapters, the interoperable model of webgis, multi - level b / s architecture, multi - thread for network computing and concurrent access, dcom, intelligent agent, intelligent spatial search engine, information security are discussed in detail. with these key technologies, the system of publishment and analysis of city air quality based on webgis is designed and implemented

    借鑒這些關鍵技術,在arcims的基礎上,設計並實現了基於webgis的全國重點城市空氣質量發布系統,將空氣質量狀況與空間數據結合起來,生動直觀的反映了各主要城市的空氣質量狀況,方便了用戶的查詢,為環保事業作出應有的貢獻。
  3. The scope of china s accession agreement provides u. s. businesses the opportunity for significantly greater market access to a broad range of goods and services in sectors that are of key importance to u. s. businesses. first, china has committed to reducing or eliminating tariffs, quotas, price controls, and other barriers on more than 7, 000 agricultural and industrial products

    中國的加入協定涉及的范圍向美國企業提供了機會,極大地擴大了美國工商界關鍵部門一系列廣泛的商品和服務的市場準入程度。首先,中國已承諾削減或撤銷7000多種農業和工業產品的關稅、配額、價格管制和其他壁壘。
  4. In chapter 4, several key techniques used in the development of the software are introduced briefly, such as the setup of the development condition, dhtml technology, active server pages ( asp ) development technology, and the interface technology, by which web server can access the back - end database

    第4章對本系統開發過程中涉及的關鍵技術作了簡要說明,重點討論了開發環境設置、 dhtml技術、活動服務器頁面( asp )開發技術和數據庫訪問技術。
  5. Thirdly, some key technologies used to implement the system are discussed, including active data objects data access technology, component object model technology, and dynamical web based on active server pages technology. in the end, results of t he research and development of this system are discussed

    然後,本文詳細探討了在系統實現過程中採用的主要技術? ? ado數據訪問技術、 com技術和基於asp的動態web創建技術,最後,對文章和系統研發工作進行了總結,並對未來工作進行了展望。
  6. In the preprocessing stage the method of user and session identification often adopt heuristic algorithm for the being of cache and agent. this induce the uncertainty of data resource. the cppc algorithm avoid the limitation and has no use for complicated hash data structure. in this algorithm, by constructing a userld - url revelant matrix similar customer groups are discovered by measuring similarity between column vectors and relevant web pages are obtained by measuring similarity between row vectors ; frequent access paths can also be discovered by further processing of the latter. experiments show the effectiveness of the algorithm. in the fourth part, this thesis bring some key techniques of data mining into web usage mining, combine the characteristic of relation database design and implement a web usage mining system wlgms with function of visible. lt can provide the user with decision support, and has good practicability

    本文演算法避免了這個缺陷,且不需要復雜的hash數據結構,通過構造一個userid - uel關聯矩陣,對列向量進行相似性分析得到相似客戶群體,對行向量進行相似性度量獲得相關web頁面,對後者再進一步處理得到頻繁訪問路徑。實驗結果表明了演算法的有效性。第四是本文將傳統數據挖掘過程中的各種關鍵技術,引入到對web使用信息的挖掘活動中,結合關系數據庫的特點設計並實現了一個具有可廣西人學頎士學位論義視化功能的web使用挖掘系統wlgms 。
  7. It is the key of realizing uplink access in epon that how to design a fair, high - performance and supporting different service qos dynamic bandwidth allocation algorithm

    如何設計一種公平、高效、支持不同業務qos的上行接入帶寬分配演算法是無源光網路實現綜合接入的關鍵。
  8. For more information, see granting authority to access an rsa key container earlier in this topic

    有關更多信息,請參見本主題前面的「授予對rsa密鑰容器的訪問權限」 。
  9. For the time being, the standard 155mbits interface is widely deployed in equipment like fr, ddn, router and atm. with stm - 1 being adopted for accessing vip customers, private networks have also become a key access means

    目前fr 、 ddn 、路由器、 atm等設備都有155mbits的標準介面,由stm - 1接入大型客戶,組成客戶的專網也成為主要的接入手段。
  10. Power control and multiuser detection are two key technique to cope with the multiple access interference and near - far effect in cdma mobile cellular communication systems, power control is a resource allocation technique that balances the received powers of the users so that no one user creates excessive interference

    功率控制和多用戶檢測是cdma移動通信系統中克服遠近效應、多址干擾的關鍵技術。功率控製作為一種可以平衡接收功率,減小對其他用戶干擾的技術得到廣泛的應用。
  11. 3. in e - government security value orientation through the research government ' s organizational structure, the government movement process, withdraws the government activity which relatively stable role and the task as the key aspect for the access control

    3 .在電子政務安全的價值取向一節中通過研究政府的組織結構、政務的運行過程,提取政務活動中相對穩定的角色和任務作為訪問控制的關鍵因素。
  12. “ on - job ” training has the advantage of ensuring that activity ( repeated actions is a key factor in the apprentices ' knowledge construction ) and participation in everyday work activities “ forces ” learners to access higher order procedural and propositional knowledge

    在職培訓也有很多優勢,受訓工人重復一些操作對他們自身的知識構成幫助很大,而且在每天工作過程中感受工作的壓力和強度有助於他們達到更高的工作水平。
  13. The role of intake tower is very important in the hydro - junction. the stability of intake tower and access ramp plays a key role in the failure - free operation of the hydro - junction

    進水塔在整個樞紐中起著極其重要的地位,它和進水口邊坡的穩定安全與否將對整個樞紐的正常運行起關鍵作用。
  14. The development of conditional access system with our own ip is the key aspect for rapid acceptance of digital tv in our country

    開發具有我國自主知識產權的有條件接收系統( conditionalaccess )是推動,保證這種良好發展的關鍵
  15. Conditional access technology ( pay - tv ) has been considered the motivity and trend of the development of digital television ( dtv ) in the globe. but in the common pay - tv system, the key which is used for decoding is stored in the set - top - box ( stb )

    在全球范圍內,有條件接收(付費電視)業務已被確認是數字電視發展的動力和趨勢,但是,在通常的付費電視系統中,用戶的解碼解密模塊均被置於機頂盒中,系統安全性較低。
  16. The essential intention of conditional access system ( cas ) is to achieve pay - tv of the digital broadcast system by means of subscriber management and authorization control. so cas is the key technology to realize the pay - tv and interact - tv. based on composite technology in transport layer, paper describes the production and structure of transport stream in mpeg - 2 standard, mpeg - 2 program special information and conditional access definition in service information from dvb standard

    有條件接收系統( conditionalaccesssystem , cas ) ,其基本目的是通過對用戶的授權控制和管理,實現數字廣播電視系統的有償服務,在為運營商帶來經濟上回報的同時,也能為用戶提供更多、更高質量的服務內容,它是實現付費電視、交互電視的關鍵技術。
  17. The gateway hardware and the key software ( access through i2c bus 、 the realization of tcp / ip protocol stack and web server, the drivers of ethernet controller and blue tooth module ) is presented in this paper. a study and analysis on the smart home system based on this gateway is presented also. at last, the main center - controlling program and server script program are written in vb and jsp for the center - controlling and remote - controlling emulation of smart home system

    論文中作者不僅給出了藍牙家庭網關的硬體設計和軟體實現的主要思想( i2c總線的訪問技術、 tcp / ip協議棧實現、網卡控制器晶元的驅動程序、 web服務器實現和藍牙模塊的驅動等) ,同時對基於該智能藍牙網關的家居系統做了一些探討和分析。
  18. When you define an access key in a label control, the user can press the alt key plus the character you designate to move the focus to the control that follows it in the tab order

    在標簽( label )控制項中定義訪問鍵時,用戶可以按alt鍵和指定字元將焦點移動到tab鍵順序中的下一個控制項上。
  19. With tgt, client requests a service granting ticket in other words, session key to access a server

    有了tgt之後,客戶機請求一個授予票據的服務(也就是會話密鑰) ,以便訪問服務器。
  20. Without an index sarg, an index scan will use the index to access the data, but will return every key in the index

    沒有索引sarg時,索引掃描將使用索引訪問數據,但是會返回索引中的所有鍵。
分享友人