输入此模式的目标命名空间的主机部分,如图8中所示,然后单击ok。
Enter the host portion of the target namespace for this schema, as shown in Figure 8, then click OK.
主机部分包括机身、主缸、压边装置、顶出缸及充液装置等组成。
The mainframe includes the body of machine, main cylinder and press edge fitting, and cylinder of pack out and filling liquid equipment etc.
从这个决定的主机部分大到足以容纳最布线,在设计是相对比较直截的。
From this determining a host portion large enough to accommodate most wiring closets in the design was relatively straightforward.
主机部分:由机架、主电机、减速机、螺杆炮筒副加料系统、电热系统、冷却系统等组成。
The main parts: the rack, the main motor, the speed reducer, the screw cylinder rewind materials system, heating system, cooling system, etc.
可以看出,这个服务器能够接收请求,因此我们必须检查虚拟主机部分,验证请求正在使用的端口有效。
As you can see, the server can accept requests, so we must review the virtual host section to verify that the port the request is using is valid.
该机由六大部分组成:上料部分、送料部分、主机部分、成品下料部分、液压动力部分、电器控制部分。
The machine is made up of six parts, including material-applying part, feeding part, main engine, product-sending out part, hydraulic drive, electric controlling part.
该实验系统按照模块化的方法进行设计,PLC部分的程序采用梯形图,而主机部分采用VB和VC编写。
Teacher worktable system was designed with modularized method, the main part of PLC software was written with ladder diagram, and that of host VB and VC.
同时,麦琪让虚假承诺保护第二块,其发现艾斯·芬尼创造了混合被那部分艾斯·芬尼,部分主机部分,大黄蜂和一部分人类。
Meanwhile, Maggie makes false promises to protect the 2nd Mass, and its discovered the Espheni have created hybrid being thats part Espheni, part skitter, part hornet and part human.
通过为主机提供您自己的个人密钥的公共部分可以避免这种情况。
You can avoid this by providing the host with the public portion of your own personal key.
这是一种特殊模式,允许指定地址的网络部分和以大括号扩住的主机地址列表。
This is a special pattern that lets you specify the network part of the address and a list of host addresses in curly braces.
主机应用程序一直是公司业务应用程序的一个重要部分。
Host applications continue to be a significant part of the set of business applications within a company.
第3部分将论述监控JVM外部资源的方法,包括主机及其操作系统以及数据库和消息传递系统等远程服务。
Part 3 will address methods for monitoring resources outside the JVM, including hosts and their operating systems and remote services such as databases and messaging systems.
就个人而言,我很喜欢这一章中ibm对于软件业的影响这部分内容,特别是在主机时代和个人计算时代初期。
Personally, I really enjoyed this chapter's discussion of IBM's impact on the software industry, particularly in the mainframe and early personal computing eras.
这将触发被扫描主机再次关闭已部分建立的连接。
This will trigger the scanned host to close the halfway-established connection again.
部分中的主机名和IP地址都有效。
Both host names and IP addresses are valid in the [Hosts] section.
conf文件中的 VirtualHost部分或单独的虚拟主机配置文件
The VirtualHost section within the httpd.conf file or a separate virtual host config file
清单9所示的部分脚本示例连接远程主机tardis。
Listing 9 shows a partial script example in which a connection is made to the remote host tardis.
在完成向导后,应该看见主机的Services部分中出现了一个虚拟服务器(图2)。
Once you complete the wizard, you should see a virtual server appear in the Services section of the home page (Figure 2).
主机名的第一个点前的部分。
子网掩码由四个字节组成,它的值为255时表示IP地址中网络地址的部分,值为0时则识别IP地址中表示主机号的部分。
The subnet mask is an octet that USES the number 255 to represent the network address portion of the IP address and a zero to identify the host portion of the address.
除了脚本包日志外,还要注意Generalinformation部分下的Locatedat字段中的主机名。
In addition to the script package logs, make note of the hostname in the Located at field under the General information section above.
请注意Shell提示符:它反映出了用户名、简写的主机名(第一个点前面的部分)、以及命令编号。
Notice the shell prompt: It reflects the user name, the short hostname (everything before the first dot), and the command number.
可以通过环境概要文件为模式中的每个部分提供IP和主机名。
Environment profiles let you provide the IP and hostname values for each part within your pattern.
出于测试的目的,本示例只使用其中的一部分列:url、片段、标题、缓存大小、相关信息、主机名和查询关键字本身。
This sample only USES a portion of them: URL, snippet, title, cached size, related information present, host name, and the query keyword itself for test purpose.
它将文件系统的一些部分从主机转移到存储子系统中。
It removes portions of the file system from the host and pushes them into the storage subsystem.
脚本的最后一部分连接到主机。
在该图的下面部分中,您可以看到这样一个架构:每台主机上都包含两个网络接口。
At the bottom of the figure, you can see an architecture that includes two network interfaces per host.
收集此类信息是跟踪足迹(先前的攻击种类中讨论过)的一部分,用来获得主机上的额外信息。
Gathering this type of information is part of footprinting, discussed earlier in Categories of attacks, and is used to get extra information on a host.
因此,用户需要按照首次为主机添加磁盘部分中介绍的操作步骤进行操作。
So, the user needs to follow the First time adding disks to host procedure.
我们确定主机和VG、记录相应的值、并且从首次为主机添加磁盘部分中的第4步(创建卷)开始执行。
As we identified the host and VG recorded these values and followed the steps in the First time adding disks to host procedure starting with step 4. Create volumes.
应用推荐