table (database) 中文意思是什麼

table (database) 解釋
數據庫表
  • table : n 1 桌子;飯桌,餐臺。2 手術臺;工作臺;游戲臺;賭臺;寫字臺。3 (飯桌上的)食物,酒菜,伙食;一...
  1. At design time, some actions, like dragging a database table from a data window onto a blank form, will create the

    在設計時,某些操作(如將數據庫表從數據窗口拖動到空白窗體)將創建
  2. Db2 rollforward database sample to end of logs and complete recover dropped table 000000000000bb000002000d to e : - tmp

    現在,在被刪除表的ddl語句清單中創建被刪除的表。
  3. The management work data of oil - field earthquake exploration and oil - well position, which has not only data of current space position, but also entitative attribute data describing, have great capacity, traditional cad graphics describing the data plus the model database managing mode ca n ' t already adapt the modem exploration with well geography information for management work demand, so it is necessary to realize the unique management of exploration and oil - field well space data and attribute data use advanced geography information system ( gis ) technique, this thesis is based on the excellence ' s table ' s top geography information system - the maplnfo software, using the second process technique, the digital relief map and tectonic map as the base map, the earthquake exploration database as the original data, established the gis of the exploration and oil - field well in the area of the liaohe oil - field, realize visualization management, it provides a reference thereunder for the earthquake exploration deplo ying the workload and proceeding the technique design, and completed lots of practical work

    油田地震勘探與油井井位管理工作數據量大,既有空間位置數據,又具有實體的屬性描述數據,傳統的cad制圖+屬性數據庫管理模式已經不能適應現代勘探和井位管理工作的需要,採用先進的地理信息系統( gis )技術,實現勘探和油田井位空間數據和屬性數據的統一管理是必然的趨勢。本文以優秀的桌面地理信息系統mapinfo軟體為開發平臺,在此基礎上進行二次開發,以數字化地形圖、構造圖為載體,以地震勘探數據庫為數據源,建立了遼河油田范圍內的地震勘探和油田管理信息系統,實現了數據的可視化管理,為地震勘探部署工作量、進行技術設計,提供了圖形和數據的參考依據。並完成了很多實際工作。
  4. This dataset represents the three columns of the database table named ope operator, which are described by the last three lines in table 1

    這個數據集表示名為ope _ operator的數據庫表中的三列,如表1中最後三行所描述的:
  5. M ( 4 ) do a deep research on the privilege management of the engineering database system co - s _ dbs, and aimed at the requirements of the cooperative design for the privilege management, purpose a privilege management model s _ pmm. this model can not only provide the well - designed structure of the privilege control table and the paniculate privilege control, but also support role mechanism, positive and negative privilege mechanism, concealed privilege mechanism, which well satisfies the requirements of the cooperative design

    ( 4 )對co - s _ dbs工程數據庫系統的權限管理進行了深入的研究,針對協同設計對權限管理的要求設計了權限管理模型s _ pmm ,該模型提供了設計良好的權限控製表結構,細粒度的權限控制,支持角色機制、正負權限機制、隱式權限機制,很好的滿足了協同設計的要求。
  6. Also we design a link state database storage scheme of distributed storage and redundance backup which ease the implementation of the routing table computation in routing node and synchronization between neighbor routers

    同時對域內鏈路狀態數據庫採用了分散式存儲、冗餘備份的方案,易於實現各節點上的路由表計算及路由器間的同步。
  7. Abstract : the data redundant in relational database is caused by the reduplication of the table, attribute, record, or attribute value

    文摘:關系數據庫的數據冗餘形成的原因有表的重復、屬性的重復、元組的重復、屬性值的重復。
  8. 1. comparing reservoir beds in details step by step, we have divided and compared the deposition time unit in guan 3 - 6 sandstone bed sets, which has been divided into 20 small beds, 30 time units : rebuilding oil sandstone body data table, building graph database, further analyzing the level and section plane configuration and combination pattern of sandstone, and deducing the maze reservoir geology model of river sandstone, are the most important basis for oil reservoir description and residual oil distribution study

    1 、採用儲層逐級細分對比方法,對館3 - 6砂層組進行了沉積時間單元的劃分對比,共劃分出20個小層、 30個時間單元;重新編制了油砂體數據表,建立了圖表數據庫,並進一步分析了單層砂體平面、剖面形態以及砂體組合模式,總結出河道砂體屬迷宮式儲層地質模型,這是精細油藏描述及剩餘油分佈研究的最重要基礎。
  9. Then data integration among classes is solved under product information as a medium among them. finally, to decrease the redundance, the table of database is designed relatively and the field is designed with information of production attribute changed

    為了提高系統的處理事物的能力以及盡可能地避免數據冗餘,數據庫表作了關聯性設計,並將產品屬性的變化信息引進數據結構的設計中。
  10. For convenience to architects of structured cabling, structured cabling cad system uses access to save these non - diagrammatic data and produces the table of equipment and material quantity according to the database. in the development process of structured cabling cad system, autocad vba is used to compile program modules which needs to operate database, visual lisp is used to compile program modules which imitates architect ' s thinking to design and draw, including the situation

    在結構化布線cad系統開發過程中,對于操作數據庫的程序模塊採用autocadvba編寫,對于模擬設計者的思路進行設計計算和繪圖的程序模塊採用visuallisp編寫,也有部分模擬設計者思路進行設計和繪圖的程序模塊需要向數據庫中讀寫數據,這部分程序模塊也採用visuallisp編寫。
  11. Class instance polls the database table for changes

    輪詢數據庫表的更改的頻率。
  12. The following actions to the table are considered changes : insert, update, delete, index rebuild or defragmentation, and database restore or attach

    對表的以下操作可視為更改:插入、更新、刪除、索引重建或碎片整理以及數據庫還原或附加。
  13. The essence of edid is to set up a normal behavior fuzzy sub collection a on the basis of watching the normal system transfer of the privilege process, and set up a fuzzy sub collection b with real time transfer array, then detect with the principle of minimum distance in fuzzy discern method the innovation point of this paper is : put forward the method of edid, can not only reduce efficiently false positive rate and false negative rate, also make real time intrusion detection to become possibility ; have independent and complete character database, according to the classification of monitoring program, design normal behavior and anomaly behavior etc., have raised the strongness of ids ; use tree type structure to preservation the character database, have saved greatly stock space ; in detection invade, carry out frequency prior principle, prior analysis and handling the behavior feature of high frequency in information table, have raised efficiency and the speed of detection, make real time intrusion detection to become possibility ; have at the same time realized anomaly intrusion detection and misuse intrusion detection, have remedied deficiency of unitary detection method

    這種方法的實質是在監控特權進程的正常系統調用基礎上建立正常行為模糊子集a ,用檢測到的實時調用序列建立模糊子集b ,然後用模糊識別方法中的最小距離原則進行檢測。本文的創新點是:通過對特權進程的系統調用及參數序列的研究,提出了基於euclidean距離的入侵檢測方法edid ,不僅能有效降低漏報率和誤報率,而且使實時入侵檢測成為可能;設計有獨立而完整的特徵數據庫,根據被監控程序的類別,分別設計正常行為、異常行為等,提高了檢測系統的強健性和可伸縮性;特徵數據庫按樹型結構存儲,大大節省了存儲空間;在檢測入侵時,實行頻度優先原則,優先分析和處理信息表中的高頻度行為特徵,提高檢測的速度和效率,使實時入侵檢測成為可能;同時實現了異常入侵檢測和誤用入侵檢測,彌補了單一檢測方法的不足。
  14. Valid yet destructive statements such as deleting an entire payroll table, dropping a claims table or even inadvertently dropping an entire database can cause extended down time for your database applications

    對于數據庫應用程序,有效但具破壞性的語句(比如刪除整個工資單表中的記錄、刪除索賠( claims )表,或者意外刪除整個數據庫)可能導致長期的停機時間。
  15. When a user drops a table in db2 udb, you can either do a database level point - in - time recovery, rolling forward to the point before the table is dropped ; or, better still, use a table space level roll forward operation

    當用戶刪除db2 udb中的表時,您可以執行數據庫級時間點恢復,前滾至刪除表之前的時間點;或者最好仍然使用表空間級的前滾操作。
  16. Multi - strategy means as follows : utilizing classifying data mining methods based on decision tree to analyze the data in grade database. a grade decision tree is generated to show directly a position of grade according to different computing methods and to support estimate. at the same time, utilizing classification method based on summing - up principles to do such things as grade query analysis and prediction and contrast analysis to realise automatic generation of grade analysis report, test paper s quality assessment report and quality analysis table which plays an active role in improving teaching and test paper s quality

    這里多策略主要是指:採用基於決策樹的分類挖掘方法,對學生成績庫中數據進行分析,生成學生成績決策樹,能直觀顯示出某一成績在不同等級計算方式中所處的位置,為教學部門提供評價信息;同時採用基於總結規則的統計分析方法,完成不同情況下的成績查詢、預測及對比分析,實現學生成績分析報告、試卷質量評價報告及質量分析表的自動生成。
  17. It simply connects to the current sql server instance by using windows authentication, and then iterates through all the user databases and performs the identity checks on each table found in each database

    它只是使用windows身份驗證與當前sql server實例連接,然後遍歷所有用戶數據庫並對每個數據庫中的每個表執行標識檢查。
  18. Abstract : in order to make an solution to modeling the image database system, this paper proposes an image data model idm, which decomposes the image object into the primary table of stable attributes and assistant tables of variable attributes and are temporarily organized to access the image data when making query and inference. it can model with unified mode each scheme of the image database system structure

    文摘:為解決圖象數據庫建模,提出一種新的圖象數據模型,將圖象對象分解為由穩定屬性組成的主表部分和若干個可變屬性組成的副表部分,查詢推理時對主表和副表臨時組織以完成圖象數據的存取管理等,它能對圖象數據庫5級模式結構的每級模式一致建模。
  19. For example, before a sql server database engine task applies shared or exclusive row locks within a table, it places an intent lock on the table

    其他用戶可以同時讀取數據,但在釋放所有共享鎖之前,任何事務都不能獲取對該數據的排他鎖。
  20. Typically, global functions perform database operations such as inserts, updates, deletes, and the aggregating of information, such as returning a count of customers in a table or the total charges for all items in a particular order

    通常,全局函數執行數據庫操作,如插入、更新、刪除和信息的聚合(如返回某表中客戶的計數或特定訂單中所有項的總價) 。
分享友人