We said that output redirection using n> usually overwrites existing files.
使用n>的输出重定向通常覆盖现有的文件。
You may specify the total number of tagged entries to return using the n parameter -- the default value is 20 (n=20).
你可以通过参数n指定返回的数量,默认为20。
The difference lies in using in scalar context (as -n does in the second script) or list context (as the first script does).
区别在于在标量上下文中的使用(如第二个脚本中使用-n)或在列表上下文中的使用(如第一个脚本所做的)。
While most developers consider "cloud" to automatically imply browser-based applications, native clients can still be deployed over the WAN using n-tier technology.
尽管大多数开发人员都认为“云”自动暗示基于浏览器的应用程序,原生客户端仍然可以通过n层技术部署在WAN上。
Many Chinese restaurants are telling people to order dishes by using the "N-1" formula."N" stands for the number of people in your group.
许多中餐馆告诉人们用“N-1”公式点菜。“N”代表你们的人数。
The process involved using intensive X-ray light produced at the National Synchroton Light Source in Brookhaven, N. Y.
这种方法使用了纽约布鲁克黑文的国家同步加速器光源产生的强大的X射线。
Yet somehow, nature is able to simulate this mathematical problem using only N particles.
然而不知为什么,大自然能仅使用N粒子模拟这一数学问题。
Evra had complained after the match that he was abused "at least 10 times" and his statement to the FA accuses Suárez of using a Spanish variation of the N-word.
埃弗拉赛后抱怨他被辱骂了“不止10次”,他交给英足总的声明控告苏亚雷斯使用那个N字头的单词的西班牙语变体辱骂他。
Web services notification (WS-N) helps standardize the way Web services interact, using notifications or events.
Web服务通知(WS - N)使用通知或事件,帮助规范化Web服务的交互方式。
Ctrl-N launches a new workspace, and you can swap between workspaces using the key formerly known as F5.
Ctrl- N新建浏览器工作窗口,你也可以使用熟悉的F5键在工作窗口之间进行切换。
Some characters (in URI references) must be escaped using URI conventions, and others use an N-Triples convention with a leading backslash.
有些字符(在URI引用中)必须使用URI约定来转义,而其它则使用前面带有反斜杠的N -Triples约定。
This document provides guidelines for using "N" and "Z" consolidation methods in IBM Cognos Controller.
本文提供在IBMCognosController中使用 “N”和 “Z”合并法的指南。
This was due to the scheduler being implemented using an algorithm with o (n) complexity.
这是由于调度器是使用一个复杂度为O (n)的算法实现的。
You can go backwards and forwards through your command history (in reverse chronological order) using Control-P (previous command) and Control-N (next).
使用Control - P(上一个命令)和Control - n(下一个命令),您可以在命令历史记录中向后或向前移动(按反向的年代顺序)。
In addition, instead of using short names for tags and attributes like s and n, you can change them to size and name, respectively (see Listing 7).
此外,如果标签和属性不愿意使用短名字如s和n,可以分别将其修改为size和name(如图7所示)。
For each virtual method, count how many arguments it has, name the result n, and define it using MOCK_METHODn, whose arguments are the name and type of the method.
对于每个虚方法,计算它的参数个数、名字和结果n,然后使用MOCK_METHODn进行定义,其参数就是方法的名字和类型。
Match it using the greedy {n,} operator.
使用贪婪的{n,}操作符进行匹配。
printf format strings can also write data (using the %n directive) and reveal arbitrary data, making this a critical vulnerability. Following is an example of this mistake
printf 的格式化字符串也可以输出数据(使用 %n指令),并且可以暴露任意的数据,这就使得这个问题成为一个非常严重的漏洞。
In general there is no such thing as plug-n-play security. Security depends on the people using the framework, and sometimes on the development method.
一般没有这种即插即用的安全,安全依赖于正在使用的框架,有时候也依赖于开发方式。
Connect to the switch using the serial console port with a straight serial cable (9600, 8-n-1, no flow control).
用串口直连电缆连接到交换机串行控制端口(9600、8 - N - 1、无流控制)。
Connect to the switch using the serial console port with a straight serial cable (9600, 8-n-1, no flow control) with default no user ID or password required.
用串口直连电缆连接到每台交换机的串行控制端口(9600、8 -N - 1、无流控制),默认下不需要用户ID和密码。
Start this container using the command lxc-start -n vsplain.
使用命令lxc - start - n vsplain启动这个容器。
The red-black tree is O(log n) in time for most operations, while the previous scheduler employed O(1), using a priority array with a fixed number of priorities.
对于大多数操作,红黑树的执行时间为O(logn),而以前的调度程序通过具有固定优先级的优先级数组使用 O(1)。
Estimated number of nodes mounting file system 1200 (set using -n).
挂载文件系统的节点估计数:1200(使用-n设置)。
When you start your containers (for instance by using lxc-start -n vs1), you'll likely get a few audit messages about SELinux access denials.
在启动容器时(例如通过使用命令lxc - start -n vs1),很可能会收到一些关于SELinux访问拒绝的审计消息。
Using the +n or -n parameter, where n is a number, you can rotate the stack left or right, as shown in Listing 5.
使用 +n或 -n参数,其中 n是一个数字,您可以向左或向右移动堆栈,如 清单5 所示。
The application servers in n-tier architecture host remotely accessible business components. These are accessed by the presentation layer web server over the network using native protocols.
N级结构中的应用服务器负责提供可远程访问的业务逻辑组件,而表现层网页服务器则使用本网协议通过网络访问这些组件。
Using this notation, you should know that search through a list is O(n) and binary search (through a sorted list) is log(n).
看到这个标记你就应该知道搜索链表的复杂度为O(n),进行二进制搜索时(已排序)的空间复杂度为log(n)。
You can change the name of this routine using the -n option. The arguments to the routine are similar to the previously explained hash function.
您可以使用- n选项改变这个例程的名称。
The Fibonacci numbers are an integer sequence where for a given number, the Fibonacci value can be calculated using: F(n) = F(n-1) + F(n-2).
Fibonacci 数列是一种整数序列,可以使用以下算式计算各个 Fibonacci值:F(n) = F(n-1) + F(n-2)。
应用推荐