Where there is more than one instance of the type to output -- in this case, where you have two cats but one dog -- you need to collect the hashes as an anonymous array of anonymous hashes.
在需要输出一个类型的多个实例的情况下 —— 在这个示例中,有两只猫和一只狗 —— 需要以匿名散列的匿名数组的形式收集散列。
It is possible to get SAML to handle anonymous or guest access, but this requires that the participating enterprises agree to their own convention for anonymous or guest authorized access.
让SAML处理匿名或访客访问是可能的,但是这要求参与的企业就其自己的匿名访问或访客授权访问的约定达成一致。
The only thing more damaging to your business than an anonymous complaint is an anonymous complaint with a very suspicious ultra-positive response.
比匿名投诉更损害你企业的唯一一件事是带有十分可疑并过度肯定回答的匿名投诉。
There are, though, some cases were anonymous avatars make sense for business use, e.g. training sessions where both managers and non-managers are involved, anonymous surveys and feedback sessions.
但是 ,也有一些用例匿名角色更能满足业务需求,例如,经理和普通员工都参与的培训活动,匿名调查和反馈活动。
The first set of enclosing braces delineates the construction of an anonymous inner class, and the second set delineates the instance initializer for the anonymous inner class.
第一组闭合括弧划定一个匿名内部类的构造,第二组划定匿名内部类的实例初始化语句块。
Whereas people used to put anonymous fliers under windscreen-wipers at malls, now anyone can mount an anonymous attack nationwide.
尽管以前人们已经习惯把些匿名的便条夹在挡风雨刷后面,然而现在任何人都可以进行一场全国范围内的匿名攻击。
For this reason, you need to maintain session for anonymous users in WebSphere Portal so you can retrieve the session attribute values for anonymous users.
基于这个原因,您需要为匿名用户在WebSpherePortal上保存session属性值,这样就可以为匿名用户重新提取session属性值。
If the system is configured to allow anonymous access, then sessions will become authenticated using a special anonymous user as there are no real anonymous sessions in IBM Cognos 8.
如果系统配置为允许匿名用户,那么会话成为使用特殊匿名用户的已验证会话,因为在IBMCognos 8中没有真正的匿名会话。
If anonymous access is allowed, the IBM Cognos 8 SDK application will be granted the same rights and permissions as the anonymous user from the Cognos namespace.
如果允许匿名访问,IBMCognos8SDK应用程序将被授予与Cognos名称空间的匿名用户相同的权利和权限。
The complexType within the element named "person" has no name itself, so it is anonymous. You can convert this anonymous type into a named type by following these simple steps
名为 “person” 的元素中的 complexType本身没有名称,因此它是匿名的。
The convert anonymous class to nested refactoring takes an anonymous class and converts it to a nested class of the method that originally contained the anonymous class.
ConvertAnonymousClasstoNested重构能够接受一个匿名类并将其转换为最初包含这个匿名类的方法的一个嵌套类。
Grant nt authority \ anonymous LOGON authority to access to the objects for which you want to enable location via anonymous lookups.
授予NTAUTHORITY \ANONYMOUSLOGON权限以便访问要通过匿名查找启用位置的对象。
We are Anonymous. You can be Anonymous, too.
我们是匿名网民,你也可以成为匿名网民。
Editing an anonymous method or any method that contains an anonymous method.
编辑匿名方法或任何包含匿名方法的方法。
Use empty parentheses on parameter-less anonymous methods. Omit the parentheses only if the anonymous method could have been used on any delegate.
没有参数的匿名方法加上空的圆括号。除非这个匿名方法可能被用到任何类型的委托上。
There's an organization called Gambler's Anonymous, which is like Alcoholic's Anonymous.
有个叫匿名戒赌协会的组织,就好像匿名戒酒协会一样
There are debates about just how anonymous Bitcoin is, but it is clearly more anonymous than most currencies or other forms of payment.
人们对比特币的匿名程度究竟有多大持有争论,但与大多数货币或其他形式的支付工具相比,比特币显然更具匿名性。
With anonymous methods mimic the code layout of a regular method, aligned with the anonymous delegate declaration.
匿名方法模仿普通方法的布局,和匿名委托定义放在一行。
An anonymous letter; an anonymous phone call.
这是一封匿名信。
Therefore, anonymous communication system can not only provide anonymous protection but also prevent anonymity abuse.
因而,匿名系统能在提供匿名保护的同时,有效地防止匿名滥用。
Therefore, anonymous communication system can not only provide anonymous protection but also prevent anonymity abusing.
因而,匿名系统能在提供匿名保护的同时,有效地防止匿名滥用。
Based on the realization of anonymous communication simulation and evaluation platform, an evaluation experiment for anonymous communication systems is represented in the paper.
在匿名通信系统仿真评估平台的实现基础上,本课题进行了匿名通信系统的仿真评估实验。
By using the results of this classification, the supply for a strategy of defense to anonymous communication system can be offered, thus the anonymous degree can be further improved.
利用该分类结果,可以为匿名通信系统中的攻击提出对应的防御策略,进一步提高匿名通信系统的匿名度。
The author is mainly focused on the study of anonymous signature, anonymous authentication, and a typical anonymous application, namely, anonymous bidding in electronic auction.
作者主要对匿名签名和匿名认证方案进行了初步的研究,并针对一个具体应用——电子拍卖中匿名竞标问题进行了分析。
This paper studies the anonymous group identity verification algorithm, which can very reliably solve the problem of the Anonymous identity verification.
研究了匿名分组身份验证算法,该算法可以非常可靠地解决网格计算平台之间的身份匿名验证问题。
When an anonymous method USES the value of a local variable, the value is obtained at the moment the anonymous method is executed.
当匿名方法使用局部变量的值时,将在执行匿名方法时获取该值。
If you do not specify member names in the anonymous type, the compiler gives the anonymous type members the same name as the property being used to initialize them.
如果您未指定匿名型别中的成员名称,编译器会提供匿名型别成员与要对其进行初始化之属性相同的名称。
If you do not specify member names in the anonymous type, the compiler gives the anonymous type members the same name as the property being used to initialize them.
如果您未指定匿名型别中的成员名称,编译器会提供匿名型别成员与要对其进行初始化之属性相同的名称。
应用推荐