The machine uses a technology that automatically adjusts the speed and tone of any song being played to match the tempo and key the singer is using.
这台机器使用了一种技术,可以自动调整任何正在播放的歌曲的速度和音调,以配合歌手所使用的节奏和音调。
You retrieve all of the user information and key the feed search off this user.
我们检索到了当前用户的所有信息及提要主键。
Our admin processes are manual, inefficient and costly as we continually re-key the same information in multiple systems.
我们的管理流程是人工、低效和昂贵的,因为我们不断地在多个系统中给相同的信息重复建立关键字。
Next to your selected certificate there should be a disclosure triangle which when clicked on will show the private key the certificate is associated with.
选中的证书旁有个小三角,点击它会显示证书关联的私钥。
When we are able to relate without ambiguity any association end to a foreign key, we can apply the correspondence to specify to which primary key the foreign key refers.
当我们能够清楚无二义地联系任何关联结尾和外键时,我们可以把通讯应用于指明外键指向的是哪个主键。
He turned the key in the lock.
他转动钥匙开锁。
She rammed the key into the lock.
她将钥匙塞进锁眼。
The second line is key, the stylesheet processing instruction (PI).
关键是第二行中的样式表处理指令(PI)。
If we reused the key, the eavesdropper would likely see a different value placed on the network due to the random padding.
通过这样一填充,即使我们重用密钥,偷听者在网络上两次看到的数也是不一样的。
Multiple letters are assigned to each key (the "2" key is also "ABC", for example), and tapping repeatedly on a key switches between its corresponding letters until the desired character is chosen.
每个按键上都有若干字母(比如“2”键上同时有abc三个字母),只要重复按键就可以选择相应字母,直到选到你要输入的为止。
Kerberos defines an algorithm for processing a user's password to produce a secret key. The Kerberos client will use this key for decryption during the process of getting the TGT.
Kerberos定义了一种对用户密码进行处理以生成一个密钥的算法。
Type GPG — verify samba-version.tar.asc to verify the key. The program should respond with a message similar to.
输入gpg——verifysamba - version. tar . asc验证这个密钥。
So in Listing 14, I called the emit function with my key (the user_name property) and a value.
因此在清单14中,通过我自己的键,我调用了emit函数(user_name属性)和一个值。
After generating a common key, the keyserver program randomly generates a conversation key.
在生成通用密钥之后,keyserver程序将随机生成一个对话密钥。
The confirmation page shows your newly generated API key, the URL it's associated with, and a sample Web page to, as they say, "get you started on your way to mapping glory."
确认页面将显示刚生成的API 密匙、与密匙相关联的URL和一个 “getyoustartedonyourwayto mapping glory” 的示例Web 页面。
If no columns satisfy the requirement for a default partitioning key, the table is created without one, which means the table cannot span more than one partition.
如果没有列能满足作为默认分区键的条件,则表在创建后就没有分区键,也就意味着这个表不能横跨一个以上的分区。
This means that, in the first few hours following the disseminationof a key, the number of pieces required to make a sent message readable can easily be gathered.
这就意味着在最开始密码传输接着的几个小时里,可以很容易收集到用来使已发送信息可读取的碎片数量.
This method takes three parameters, the primary key, the action performed on the table (create, update, delete) and a result set.
此方法具有三个参数,主键、对表执行的操作(创建、更新、删除)和结果集。
Speed is the key –the transfer of the solar energy takes place almost instantaneously so little energy is wasted as heat.
关键之处就在于速度,太阳能的传递几乎就在瞬间完成,所以很少能量以热的形式耗散掉。
Because that allows for the user to type a lot of text; then, a second after the user presses the last key, the search will run.
因为这将允许用户输入大量的文本;然后,当用户按下最后一个键时,第二种方法将运行搜索。
While holding down the CTRL key, the user can choose multiple options in the list.
而在按住CTRL组合键时,用户可以选择列表中的多个选项。
Once the security server confirms the identity of the user via secret key, the login process of the user into the DCE is completed.
一旦安全服务器通过秘密密钥确认了用户的身份,用户登录到DCE的过程就完成了。
If you can decrypt the message using your public key, the server knows you are authorized to log in without a password.
如果您能使用您的公共密匙解密该消息,那么服务器就知道您被授权无需密码即可登录。
Then using the decrypted conversation key, the server decrypts the client timestamp.
然后,服务器使用解密的对话密钥来解密客户端时间戳。
The key used for the data encryption could be the same key passed in the original request or another randomly generated key, the latter being more typical.
用于数字加密的密钥可能是在最初请求中传送的同一密钥,也可能是另一个随机生成的密钥,而后者更具代表性。
That's what the key, the metaphysical glue is, being the same hunk of stuff.
关键在于,要保持同一个东西,形而上的粘质是什么。
To address the common need to obtain the value of an auto-generated or auto-incremented key, the JDBC 3.0 API now makes it painless to obtain this value.
为了解决对获取自动产生的或自动增加的关键字的值的需求,JDBC 3.0API现在将获取这种值变得很轻松。
Y: I turn the key, the engine ignites.
Y:我拧车钥匙,引擎发动。
What else? Strongly felt tonal key, which is called — I don't know if I mentioned this or not — the tonic key, the tonic pitch, the tonic pitch there, and this idea of the direction of the music.
还有什么,强烈感受到的主调,它叫什么来着,我不确定我是否已经提及到了,主调,主音高,包括了主音高,还有音乐走向的观点?
To Notify Clients About Real-World Events The user pressed a key; the clock struck midnight; the fan failed and the CPU is on fire.
通知客户机实际的事件:用户按下某个按键;午夜时钟敲响;风扇停止工作造成 CPU 烧毁;
应用推荐