Validity of the network protocol.
网络协议的正确性。
MAC address of the network adaptor (optional).
网络适配器的MAC地址(可选)。
The study of the network game related knowledge.
学习研究了网络游戏的相关知识。
This leads to a more efficient use of the network bandwidth.
这将能够更高效地使用网络带宽。
In this step, we will calculate the error of the network.
在这一步,我们将计算网络的误差。
Or do all computers of the network have the same problem?
还是网络中的所有电脑都有同样的问题?
High demand has resulted in the rapid enlargement of the network.
对接受BEC培训的高需求导致了网络的迅速扩大。
Thus, the structure of the network is stable and self-reinforcing.
如是,网络的结构就是稳定的并且自我强化。
Parts of the network have been shut down.Others are still operating.
这个网络部分已经关闭,余下部分仍在运作。
The name of the network marketing company jogged an old memory.
网络营销公司名义慢跑老回忆。
Parts of the network have been shut down. Others are still operating.
这个网络部分已经关闭,余下部分仍在运作。
Examples of the network effect can be found through-out the cloud.
网络效应的例子在云端随处可见。
That is to say, we interact with the Internet as users of the network.
也就是说,我们接触因特网作为网络的用户。
They're not radically different from routers inside the middle of the network.
要知道,它们跟网路中的交换机是无本质差别的。
Special formulate superintends the legal no time to delay of the network.
专门制订监管网络的法律刻不容缓。
The network TAB provides a detailed picture of the network usage of a session.
Network选项卡提供关于一个会话的网络使用情况的详细信息。
Security scans are an important part of the network security strategy for a company.
安全扫描是公司网络安全策略重要的一部分。
Basically there are three key advantages from the point of view of the network.
从网络的观点出发,主要有三个优越性。
For example, we might increase the size of the network on which the system is running.
例如,我们可能想增大一个正在运行的系统的规模。
And encryption technology is the core technology of the network security technology.
而加密技术则是网络安全技术中的核心技术。
This guides you to the specific areas of the network that might require some tuning.
它指引你进入网络中可能需要调整的特定区域。
In chapter two, describes hardware system design of the network-stye instrument bus.
第二章阐述网络式仪器总线硬件平台的设计。
To monitor the flow rate of the network, the system gives the function of statistic.
为了监控网络的流量,本系统拥有统计功能。
The following figure shows the structure of the network for the sample configuration.
下图显示示例配置的网络结构。
This message flows through each of the network elements that the initial INVITE came over.
此消息将通过初始INVITE 所经过的每个网络元素。
In addition, the configuration and data management of the network have been designed.
另外,实现了网络配置及网络数据的管理。
Aim Provide a literature basis for research strategy of the network attack technology.
目的为网络攻击技术研究策略提供文献依据。
Aim Provide a literature basis for research strategy of the network attack technology.
目的为网络攻击技术研究策略提供文献依据。
应用推荐