NOTE: If cleaning leather seat, please make partial test, and then access.
注意:如清洗真皮坐垫,请局部作试验后,再取用。
This will let you format the same data in different ways and then access it directly.
这种方法允许您以不同的方式对相同的数据进行格式化,然后直接访问它。
He allegedly used that illegal access to tap into a wire, hack into MIT's network, and then access Jstor's library.
依其申述,他采用这种非法方式进入一根电线,私自存取mit的网络,然后访问了Jstor图书馆。
You can save documents, web clippings, audio files, pictures and of course text notes and then access them from Evernote on any device.
你可以保存文档、网页剪辑、音频文件、图片,当然还有文本笔记,然后你可以从任何一个设备上的Evernote进行同步访问。
Do I first get nearest Google places from the current location and then access the database for bike location and make markers on the map?
我先把谷歌从当前位置最近的地方然后进入自行车位置数据库和地图上做标记?
A user can deposit a check using the check reader on the machine and then access the money via the mobile app to pay bills or transfer money.
用户可以使用手机上的支票阅读器存入支票,然后通过移动应用程序来支付账单或转账。
Applications connect to one of the messaging engines implemented using depicted in the article patterns, and then access the group's properties.
应用程序连接到使用文中介绍的模式所实现的消息引擎之一,然后访问组属性。
Because the Twitter data is an array of objects, it makes sense to parse the entire string into an array and then access the object individually by ordinal position.
因为Twitter数据是一个对象数组,整体解析成一个数组然后按顺序逐个访问对象是明智的选择。
You can define template variables within the View through the setAttribute() method, and then access the variables within the template itself as keys of the $t array.
您可以通过setAttribute()方法在视图内部定义模板变量,然后在模板内部以 $t 数组的键的形式访问这些变量。
I was lucky to be at the technology conference then, and I had access to 3D printers.
当时我很幸运能参加技术会议,而且我可以使用3D 打印机。
You need to get special permission to access them, and then you have to wear gloves to handle them because the oils in our hands can destroy the paper.
你需要得到特别许可才能接触它们,处理的时候还必须戴上手套,因为我们手上的油会毁了纸。
So far, you learned how to create metadata, then populate and access a data graph corresponding to the metadata.
到目前为止,您已经了解了如何创建元数据,然后填充和访问与元数据对应的数据图。
It all starts with the ability to recognize information of value and then organize that information for storage, access, and ultimately presentation to a specific audience.
这一切全都从识别有价值的信息的能力开始,然后组织该信息以便存储、访问并最终向特定的受众进行展示。
Then use the methods shown to access and iterate over all the target data.
然后使用所展示的方法来访问并迭代所有目标数据。
If a user tries to access a protected column that their LBAC credentials do not allow them to access, then the access will fail and they will get an error message.
如果一个用户试图访问一个受保护的列,而他们的LBAC凭证又不允许他们访问该列,那么这样的访问将失败,用户收到一条错误消息。
Anyone can scan a barcode on an item at a store and then automatically access any eBay listings of the product on the marketplace.
任何人只要扫描一家商店某商品的条形码,然后就可以在市场上自动获取该商品的任何易趣产品。
Authenticated and authorized users can then access a protected resource without performing the login procedure repeatedly.
然后,经过身份验证和授权的用户可以访问一个受保护资源,无需重复执行登录过程。
These services require you to access and query them, and then parse results in non-standard ways.
这些服务需要您进行访问和查询,随后以非标准化的方式解析结果。
Collect distribution statistics and then generate the access plan again.
收集数据分布的统计信息,然后再次生成访问计划。
We'll get started with some sample code and then jump right into how you access generic information at run time.
我们首先使用一些示例代码,然后直接讨论如何在运行时访问泛型信息。
The best way to do that is to keep the cost of entry low, perhaps by subsidizing or giving away equipment the user needs to connect and then charging little for access and use.
达成这个目标的最优方法是尽量降低接入门槛,比如可以补贴甚至免费赠送网络接入设备,然后再收取很少的接入和使用费用。
A hacker could perform a memory dump at the right time and then gain access to this sensitive data.
黑客则会在适当的时刻,将内存中的信息转储出来,进而成功地访问这些敏感数据。
Make sure that the access definition is accurate, and then proceed.
确定访问定义是准确的,并且得到了处理。
If this condition is not met, then read and write access is denied.
如果不满足此条件,就拒绝读和写访问。
Acegi relieves you from writing code, so in this article, I show you how to first store user and role information in ApacheDS and then implement an access control policy for that information.
Acegi将减轻代码编写的工作,因此在这篇文章中,我将展示如何将用户和用户角色信息存储到ApacheDS中,然后实现这些信息的访问控制策略。
Give Full control access to MQM and then click OK.
向mqm提供完全控制访问权,然后单击ok。
"If all countries agree on a common approach, and stop commercial exploitation, then access will be more equitable and we will have fewer health tragedies."
“如果所有国家能商定共同做法,并禁止谋取商业利益,那么获得移植的机会将会更加公平,并且将会减少卫生悲剧的发生。”
You can start DB-Access in Menu mode and then select options from menus, or you can invoke DB-Access from the command line.
您可以在Menu模式下启动 DB-Access,然后从菜单选择选项,或者从命令行调用 DB-Access。
You can include email, documents, chats, Web links, and more in an activity and then give access to other people to allow them to see the current status of the activity.
可以在一个活动中包括电子邮件、文档、聊天、Web链接等,并将访问权提供给其他人,使他们可以看到该项活动的当前状态。
OAuth requires that Service Providers first authenticate the User, and then ask them to grant access to the Consumer.
OAuth要求服务提供者首先认证用户,认证完成之后要求用户批准消费者的访问。
应用推荐