我会给出下面的假定。
Let's assume the following access rules.
让我们假设以下访问规则。
For the example in Listing 6, assume the following.
对于清单6中的示例进行以下假定。
As in Part 1, assume the following access rules.
与第1部分一样,假设以下访问规则。
The instructions in this section assume the following
本小节中的指令假定下列内容
For the purposes of this article, we assume the following.
对于本文,我们有以下假设。
Using Oracle as an example, assume the following SQL statement
以Oracle为例,假设执行以下SQL语句
Assume the input file in this example has the following content.
假设此示例中的输入文件具有以下内容。
In addition, the following instructions assume that the customer's requirements are 'standard'.
另外,下面的说明假定客户的需求是“标准的”。
TIP: the following instructions assume the software has been installed in the default location.
提示:下面的指导假定软件已经安装到默认位置。
Assume we only have the following access rule in our hosts.allow.
假设我们在hosts . allow中只有以下访问规则。
Assume you have the disks in the following state.
假设磁盘处于以下状态。
Let's assume that we have a remote Oracle table with the following definition.
假设有一个远程oracle表,该表具有如下定义。
Let's assume that the following data is stored in the INVENTORY table.
假设如下数据存储在inventory表。
Let's assume that the following data is stored in the INVENTORY table.
假设如下数据存储在inventory表。
应用推荐