She is sorting index card into alphabetical order.
她在按字母顺序整理索引卡。
The genealogical sorting index ( gsi ) is a statistic to quantify the common ancestry of labeled tips on a tree.
是用于量化世系树中被标记出的末梢的共有祖先的统计资料。
Each sorting arrow on a column in a view increases the view index and the time it takes to refresh the view.
视图中的列上的每个排序箭头都会增加视图索引,同时还会增加刷新视图的时间。
The load and create index operations always use private sorts for index key sorting, regardless of the value of the INTRA_PARALLEL parameter.
装入和创建索引的操作通常使用私有排序进行索引键的排序,无论INTRA_PARALLEL参数的值如何。
Sorting is required when no index satisfies the requested ordering of fetched rows, or the optimizer determines that a sort is less expensive than an index scan.
如果没有索引满足所取的行的要求顺序,或者优化器断定排序的代价低于索引扫描,那么就需要进行排序。
Also keep in mind that on AIX, there is approximately a Max of 250mb of private virtual memory for index key sorting in LOAD (this is a memory bottleneck).
还请记住,AIX上大约有最大为250MB的私有虚拟内存用于LOAD中的索引键排序(这是内存瓶颈)。
Because the NPSI is a single ordered list, it is easy to see how DB2 could just toggle back and forth, index to table, index to table, and return rows in ZIPCODE order without sorting.
因为NPSI是一个单序列列表,很容易看到DB 2如何来回切换,从表到索引、索引到表,然后以ZIPCODE次序返回行,而不需要排序。
Methods: to classify constitution according to the traditional Chinese medicine sorting standard and to assay blood pressure, boody mass index, electrocardiogram and biochemistry indexes.
方法:采用中医体质分类标准进行分类,并做血压、体量指数、心电图和生化等指标测定。
Objective: To explore the more stable and precise index (endophenotype) in the Wisconsin Card Sorting Test (WCST).
目的:探索威斯康星卡片分类测验测试各指标中更稳定、更精确的指标(内表型)。
And it emphasizes the executive scheme of the file library's structure, the index arrangement, the data sorting and protecting, the code making and the file library's modification.
并着重对该系统文件库的结构、索引的安排、码的编制,数据的检索和保护及文件库的修改等实施方案进行了论述。
Using a vulnerability index and reviewing risks from deliberate and random attack the effectiveness of the sorting methods is then evaluated.
则节点移除后网络的破坏程度可以用最大连通子图的相对大小,全局效率以及脆弱性指标来进行评价。
Using a vulnerability index and reviewing risks from deliberate and random attack the effectiveness of the sorting methods is then evaluated.
则节点移除后网络的破坏程度可以用最大连通子图的相对大小,全局效率以及脆弱性指标来进行评价。
应用推荐