The control group read a regular science textbook description about their great achievements.
对照组则定期阅读科学教科书上关于他们伟大成就的描述。
If you know these things about online news, and can use them in your everyday life, then you have the control over what to read and what to believe.
如果你知道这些关于网络新闻的事情,并且可以在日常生活中用到,那么你就可以控制读什么以及相信什么。
Each subsection you've just read provides the template you can use to define control attributes.
您刚才阅读的每个小节,均提供了可以用来定义控制属性的模板。
In addition, you can apply fine-grained access control distinctly to each image and each pattern, controlling who can read the asset and who can edit it.
另外,可以对每个映像和每个模式应用不同的细粒度访问控制,控制能够读取资产的用户和能够编辑资产的用户。
With optimistic concurrency control, the database manager releases the row or page locks immediately after a read operation.
通过使用乐观并发控制,数据库管理器在完成读操作之后可以立即释放行或页锁。
Although the first two command types perform no action within the kernel, the rest are used to read log messages or control aspects of logging.
虽然前面两个命令类型不会对内核进行任何操作,但是其余命令则是用于读取日志消息或控制日志。
Fine-grained access control goes beyond granting or denying the right to execute a program or read a data file.
细粒度访问控制不只是授予或拒绝执行程序或读取数据文件的权限。
This means we can get control whenever data is read from or written into a particular address.
这意味着每当从某个特定地址读取数据或将数据写入该地址时,我们都可以对此进行控制。
Don't use regular expressions to read XML that comes directly from users; you don't control the form or structure of that XML.
不要用正则表达式读取直接来自用户的XML,因为无法控制这类XML的格式或结构。
Bar codes, which can be read by a laser scanner, are used worldwide for inventory control on consumer products.
条形码可由激光扫描仪识别,在世界各地被广泛应用于消费品库存管理。
That's why FAI USES simple configuration files meant to be stored in your favourite version control system and easy to read and write manually.
为了能够存放到版本控制系统,而且易读易修改,FAI采用了很简单的配置文件。
Read on to discover your inner control freak.
请继续读下去,以发掘您内心有关控制方面的奇思怪想。
Read more air traffic control staffing under scrutiny.
多了解一点在严格管制之下的交通控制。
Security to control who can write to or read from a queue.
控制谁可以向队列中写以及谁可以从队列中读的安全性。
For more information on how to use the registry and SYSTEM attributes to control user login, please read the "AIX Security Guide" and the articles listed in the Resources section.
有关如何使用registry和SYSTE m属性来控制用户登录的更多信息,请阅读“AIX安全指南”和参考资料部分中所列出的文章。
Vengroff points out that users control whom the program lists as their friends, who can read their reviews, and who can see their physical locations.
Vengroff指出,用户可以控制加哪些人为好友,哪些人可以阅读他们的评论以及查看他们的地理位置。
There are various permissions - read, write, full control - assigned to users, and access granularity established at bucket or object level.
这是各种权限:读、写、完全控制、指定给用户、bucket或对象级别的访问粒度。
Realm Write operations: Currently all Realm implementations support 'read' operations for acquiring authentication and authorization data to perform logins and access control.
Realm写操作:目前所有Realm实现都支持“读”操作来获取验证和授权数据以执行登录和访问控制。
The next article in this series shows you how to design access control policies, how to host them on a directory service, and how to configure Acegi to read your access control policy.
本系列的下一篇文章将展示如何设计访问控制策略,如何将它们托管在目录服务中,以及如何配置Acegi以读取您的访问控制策略。
At the same time, by setting appropriate access control, the file may be read only by the ID under which the broker runs.
同时,通过设置适当的访问控制,只能通过broker运行所用的ID来读取该文件。
This could cause the users to become lost because they cannot control the Web page and nothing else can be read.
这会导致用户无法控制web页面,且无法阅读任何内容。
If you're not familiar with distributed version control systems, then Git for Eclipse Users is worth a read.
如果你不熟悉分布式版本控制系统,那么Eclipse用户Git手册值得一读。
By using this knowledge, you can pass in a parameter to the read method or the readline method to control how many characters are read.
通过使用这个知识,可以向read或readline方法传递一个参数,控制读取的字符数。
For example, one system might not distinguish between read and write operations from the access control perspective, while others might.
例如,一个系统可能无法从访问控制的角度区分读写操作,而另一些系统则可以对此进行区分。
So, I didn't have to learn much or read any documentation to use the control.
所以,我不必学习很多东西,也不必阅读任何文档,就可以使用这个控件。
Using this feature, data stewards can control read and write access for users and groups at the table column and row level.
借助这个特性,数据管理员可以在表的列和行级别控制用户和组的读写访问。
These files should be stored in source control and be marked as read-only on the servers.
这些文件必须要放在版本控制系统中,而且应该把服务器上的文件标记为只读。
God is in control and the final chapter of your life, you haven't read yet.
神一直在掌管着,你生命的最后一章神也掌管着,你还没读呢。
When you define an object or a bucket in S3, you can specify an access-control policy that states who can access your S3 assets and how (for example, read and write permissions).
在s3中定义对象或存储段时,您可以指定一个访问控制策略,注明谁可以访问您的S3资产以及如何访问(例如,读和写权限)。
The operating system scheduler determines which thread gets control of the mutex next-typically, the reader thread that has waited the longest gets to read the data first.
操作系统调度程序决定哪个线程获得对互斥锁的控制权—通常,等待时间最长的读线程先读取数据。
应用推荐