操zhòngyīngguànyònglìgōu:
| - zài jì suàn jī 'ān quán xué zhōng, shǐ duì yī zì dòng xì tǒng de cāo zuò huò gōng néng de 'è liè yǐng xiǎng néng lì jí yì tú dé yǐ shí xiàn de shǒu duàn。
In computer security, the means through which the ability orintent of a threat agent to affect adversely an automated system facility or operation can is manifest.- zhàng zhe sān shí nián lái tā shì cǐ jiān yī wèi pǐn dé wú xiè kě jī de zhèng zhì rén wù, hā tè fěi 'ěr dé cān yì yuán 'ān rán dù guò yǐ qián suǒ yòu lìng tā fā jiǒng de cāo shǒu wèn tí。 kě shì zuì jìn suǒ jiē lù zhè wèi 'é lè gāng zhōu gòng hé dǎng rén de cái wù xíng wéi, bǎ tā wú kě zhǐ zé de xíng xiàng pò huài wú yí。
Senator Mark O. Hatfield has survived past ethics scrapes by riding on his reputation for three decades as a political figure whose integrity was above question here. But the latest disclosures about the Oregon Republican's financial dealings have shattered any remnants of his unimpeachable image.- cǐ xiàng gōng bù de guān jiàn bù fēn shì wēi ruǎn chéng nuò tí jiāo xīn de cāo zuò xì tǒng tè sè, chēng zuò líng guǎn lǐ, ràng guǎn lǐ rén yuán jí zhōng guǎn lǐ pc jī jí yuǎn dì fēn pèi hé 'ān zhuāng ruǎn jiàn。
A key part of the announcement was Microsoft's promise to deliver new operating system features, dubbed Zero Administration, that would let administrators centrally manage PCs as well as remotely distribute and install software.- yī zhǒng tōng cháng kě yí dòng de hù lián shè bèi, gǎi biàn tā de lián xiàn kě yǐ kòng zhì jì suàn shè bèi de cāo zuò。 tā yòng zài chuān kǒng kǎ piàn jī zhōng, zài yòng hù kòng zhì xià wán chéng yī xiē cāo zuò。 duì yú jì suàn jī, zhù yào yòng lái kòng zhì shū rù shū chū cāo zuò。
An interconnection device, usually removable, that employs removable wires to control the operation of computing equipment. It is used on punch-card machines to carry out functions that are under control of the user.On computers it is used primarily to control input/output functions.- zài qiē huàn rcs zhī hòu, tuì chū fú wù cāo zuò huì shān chú ds1 lián jiē。
After RCSs are switched, the remove operation removes the DS1 connection.- shǐ ds1 wú tiáo jiàn tuì chū fú wù de cāo zuò huò mìng lìng huì bù gù duì hū jiào huò fú wù chǎn shēng de yǐng xiǎng 'ér shǐ zhǐ dìng de ds1 tuì chū fú wù。
An unconditional remove DS1 operation or command removes the specified DS1 from service regardless of call or service impacts.- jiē xià lái, zhè gè xiǎo zǔ xī wàng zài 2 00 6 nián fā shè yī kē míng wéi astro( zì zhù kōng jiān yùn shū jī qì rén cāo zuò ) de xiǎo wèi xīng, zài yùn xíng guǐ dào de zhǐ dìng dì diǎn yǔ nextsat huì hé, yàn zhèng zhè liǎng kē wèi xīng kě yǐ duì jiē。
Then, by2006, this team hopes to launch a smaller satellite, called ASTRO(short for Autonomous Space Transport Robotic Operation), to rendezvous with NextSat in orbit and prove that the two satellites can dock.- gēnghuàn jìhuà xiàn zhèng jìn xíng, yǐ qī gǎi shàn cāo zuò xiào néng。
A renewal programme is underway to improve operational effectiveness.- dāng jú xiàn zhèng gēnghuàn jiù yòu de jǐn jí qiú zhù diàn huà, yǐ qī gǎi jìn diàn huà de cāo zuò xiào néng。
A renewal programme is under way to improve the operational effectiveness of the roadside emergency telephones.- jī gōng zhì zào、 cāo zuò huò xiū lǐ jī qì de rén
One who makes, operates, or repairs machines.- rú guǒ bù néng chóngfù shàng cì cāo zuò, chóngfù cài dān xiàng huì biàn huà dào “ bù néng chóngfù” xiàng
The repeat menu item changes to can not repeat if you cannot repeat your last action- xǔ duō kē xué jiā rèn wéi yòng tōng cháng guī fàn de kē xué fāng shì lái zhèng shí dòng wù jù yòu qíng gǎn shì bù kě néng de, yīn wéi zhè zhǒng fǎn fù de guān chá shí yàn kě yǐ zài shòu kòng de shí yàn zhōng cāo zòng jìn xíng, zhè jiù shǐ zhè xiē kē xué jiā dé chū jié lùn, jí dòng wù de zhè zhǒng qíng gǎn shì bù cún zài de。
Many scientists also say that it is impossible to prove animals have emotions using standard scientific methods -- repeatable observations that can be manipulated in controlled experiments -- leading them to conclude that such feelings must not exist.- lián xù chóngfù tóng yī cāo zuò huò tóng yī zǔ cāo zuò。
The continued repeating of the same operation or group of operations.- ( shù xué zhōng) tōng guò chóngfù tè shū de shù xué cāo zuò lái biǎo dá xīn chǎn shēng de shù yǔ de fāng shì。
(mathematics) an expression such that each term is generated by repeating a particular mathematical operation.- cāo zuò xì tǒng xíng bìng dú fā zuò shí yòng zì jǐ de luó ji dài tì bù fēn cāo zuò xì tǒng。
Operating system viruses work by replacing parts of the operating system with their own logic.- méi tǐ duì yú kē xué de zuò yòng hé cāo zòng zhè zhǒng jī qì de rén de sī wéi tí gōng liǎo yòu xiàn 'ér bǎo guì de shēn rù fēn xī。 zhè bìng bù yì wèi zhe méi yòu dì fāng kě yǐ bào dǎo zhè zhǒng xīn de kē xué。
The media provide precious little insight into the working of science and the minds of the men who manipulate the machine. This is not to say there is not a place for the kind of science reportage that is current.- cí pán cāo zuò xì tǒng
An operating system that resides on a disk. - wú lùn shì zài cāo chǎng shàng, hái shì zài jù huì shàng, xiǎo jiā huǒ men měi dāng yào zuò chū xuǎn zé shí, zhè jù zhòu yǔ bān de huà jiù huì zài 'ěr biān huí xiǎng。
From playgrounds to parties,the mantra resonates among tots and teens with each choice they make.- dì sān, lì yòng zì jǐ de dì wèi, yǐ fēi cháng yǐn bì hé qiǎo miào de fāng fǎ, jìn xíng xuān chuán zǔ zhì gōng zuò, dàn bù kě cāo zhī guò jí。
Third, they should exploit their own position to conduct propaganda and organizational work secretly and resourcefully, but they should guard against impetuosity.- wǒ men de chén liè shì wèi yú shāng yè zhōng xīn, kě wéi shāng pǐn chén liè yǔ shì fàn cāo zuò tí gōng fēi cháng yòu lì de tiáo jiàn。
Our showrooms, situated in the business center, offer admirable facilities for display and demonstration.- zhè xiē qiú fàn de mìng yùn cāo zài fǎ guān shǒu lǐ。
The fate of these prisoners rests with the judge.- shù jù zài chù lǐ qì zhōng jìn xíng de jì suàn huò luó ji cāo zuò guò chéng。
the temporary retention of data in a processor while calculations or logical operations are performed on it.- duì shù jù jìn xíng luó ji cāo zuò huò jì suàn de shí xiàn guò chéng huò fāng fǎ, bāo kuò shù jù yùn suàn shí rú hé zài chǔlǐ jī cún chǔ qì zhōng zàn shí cún fàng zhōng jiān jiēguǒ。
The performance of logical operations and calculations on data, including the temporary retention of data in processor storage while it is being operated upon.- zhè xiàng chéng xù jiāng qǔ dài chēng wéi shì wǎng mó biàn shí de jiù jì shù。 wǎng mó biàn shí bǐ jiào de shì yǎn jīng hòu fāng xuè guǎn de mó shì, céng bèi yòng lái guǎn zhì hé zǐ wǔ qì de cāo kòng quán, dàn shì tā shǐ zhōng wèi néng fēng xíng, yīn wéi shǐ yòng zhě děibǎ yǎn qiú còu dào tòu jìng shàng。
The process will replace an older technology called retina identification, which compared the pattern of veins in the back of the eye. Used to control access to nuclear weapons, retina identification has never caught on with the public because it requires the user to put their eyeball right up against a lens.- tiáozhěng háng xiàng zài xiá zhǎi de shuǐ dào zhōng cāo zòng chuán, tōng guò tiáozhěng fēng fān yǐ biàn shǐ fēng fān jiànjìn chū de fēng xiàng yòu suǒ gǎi biàn
To maneuver a vessel in a narrow channel by adjusting the sails so as to let the wind in and out of them in alteration.- zhè tái chē chuáng zhèng yóu cāo zuò rén yuán zài tiáozhǔn。
The lathe is being adjusted by the operator.- zài shǒu gōng xìn xī jiǎn suǒ cāo zuò zhōng shǐ yòng de yī zhǒng jīn shǔ zhēn, kě yǐ chuān guò kǎ piàn xiǎo kǒng huò qièkǒu, yòng lái bāng zhù duì kǎ piàn jìn xíng pái xù huò xuǎn zé。
A probe in a manual information retrieval operation that may be passed through holes or notches to assist in sorting or selecting cards.- cāo zuò gān yòng lái tiáojié huò cāo zuò mǒu yī jī xiè zhuāng zhì de tū chū bǎ shǒu
A projecting handle used to adjust or operate a mechanism.- xì tǒng wéi zhí xíng yī zhǒng duì xiàng cāo zuò( rú jiǎn suǒ yī gè wén jiàn) shí, yòng hù jìn chéng bì xū jù yòu wán chéng gāi zuò yè de xǔ kě。
Permission which the user process must possess for the object in order to carry out an operation on the object(i.e. to retrieve a file).- rú guǒ zhè yī zhòng shì cāo zuò huò dé chéng gōng de huà, xīn de xìn xī yīngdāng qǔ dài yuán xiān huǎn cún de xìn xī jìn rù dāng qián de huǎn cún。
If the result of this retry is successful, the new information should replace the cached information.- cǐ wài, yóu yú kāi fā rén yuán jiāng bù bì zài wéi měi gè cāo zuò xì tǒng xīn bǎn běn chóngxīn biān xiě qū dòng chéng xù ruǎn jiàn, suǒ yǐ kāi fā rén yuán néng jiāng qū dòng chéng xù yōu huà, bìng shǐ zhī gèng jiàn zhuàng。
In addition, since developers will no longer have to rewrite driver software for each new operating system release, they can optimize the software and make it more robust.- zài jì suàn jī 'ān quán xué zhōng, jīng chǔlǐ cāo zuò hòu, xiāo cí huò zhòng xiě shù jù qián shèng liú zài cún chǔ qì zhōng de shù jù。
In computer security, data left in storage after processing operations and before degaussing or rewriting has taken place.
|
|
|