这个参数指出,在完成一个防护模式例程调用之后,是否保留防护模式进程(db2fmp)。
This parameter indicates whether or not a fenced mode process (db2fmp) is kept after a fenced mode routine call is complete.
防护模式进程是作为单独的系统实体创建的,以便将用户编写的防护模式代码与数据库管理器代理进程隔离开来。
Fenced mode processes are created as separate system entities in order to isolate user-written fenced-mode code from the database manager agent process.
数据库设计的经验表明,模式作为避免编程错误的防护措施很有用。
Experience with database design shows that schemas are most useful as a safeguard against programming errors.
大脑就是你所有的装备中最有效的安全防护工具-所以果断将它调整至下攀模式。
The most effective safety tool in your arsenal is your brain — so engage it with a decided push into DC mentality.
它代表系统上缓存的空闲防护模式进程(db2fmp)的数量。
It represents the number of idle fenced-mode processes (db2fmp) pooled on the system.
本文研究的主要目的是通过物模试验探索一种新型的海底管线防护模式,实现管线冲刷区的快速防护。
The main aim of this thesis is to search for a new type of shield model for subsea pipeline through physical module experiments, and to realize quick protection for pipeline in swash zones.
空间碎片工程模式是防护设计的基础。
The space debris engineering model is the foundation of the protection design.
该系统具备一次模式曲线无线传输的防护和列车自动控制的功能。
The system has the functions of primary mode profile protection and automatic train control.
提出适合贵州喀斯特地区公路石质边坡环境特点植物配置模式和边坡防护与环境保护技术。
It puts forward the plant disposition pattern and the environmental protection technologies appropriate to highway slope characteristics in Karst areas in Guizhou Province.
坡地人工植被的生态效益防护林—桔园模式优于无防护林桔园模式。
The ecological effect of the orchard-shelterbelt model is better than that of the orchard model in the gental sloping fields.
文章分析了一种可信计算平台的终端安全体系,并讨论了可信计算平台的可能应用模式,对终端的安全防护能够起到一定的指导意义。
The paper analyses a kind of terminal architecture of trusted computing platform, and discusses it's possible application mode. It can reference terminal security.
研究了坝坡作为土地资源能否进行开发利用以及由此可能产生对坝体安全稳定的影响程度,坝坡开发利用及其防护措施的模式的建立等问题。
Based on the experimental demonstration and investigation, the effects of developing utilization of silt arrester slop on the dam stability, and the protecting measures were studied.
支持连续防护和仅需要时防护两种模式。
Continuous protection and support only when necessary protection in two modes.
在网络拓扑上主要采用DMZ管理区模式,通过SSL认证系统加强网络信息安全防护。
The model of the DMZ is adopted to manage the network topology and SSL authentication system is used to strengthen the security of the network information.
在网络拓扑上主要采用DMZ管理区模式,通过SSL认证系统加强网络信息安全防护。
The model of the DMZ is adopted to manage the network topology and SSL authentication system is used to strengthen the security of the network information.
应用推荐