当一个期望(或期望结果)追溯到一个其他的期望,并依次追溯到另一个期望时,AND可溯性是可能的,如图5所示。
And traceability is possible when an expectation (or expectation result) traces out of one other expectation, which in turn traces out of another expectation, and so on, as shown in Figure 5.
如果是这样,您可以在“覆盖单一节点可用性%”单元格中输入这种信息,如下图10所示。
If so, you can enter this in the "Override calculated single node availability %" cell, as shown in Figure 10 below.
当期望(或期望结果)追溯到多于一个其他的期望时,OR可溯性成为可能,如图6所示。
Or traceability is possible when an expectation (or expectation result) traces out of more than one other expectation, as shown in Figure 6.
为了在打印页面上体现这种效果,我们使用与清单21相似的技术添加一些说明性文本,如图23所示。
Translating this to the printed page, we use a similar technique shown in Listing 21 to add some clarifying text, as shown in Figure 23.
每个实现通过形式化的可追溯性,将业务过程中的一个活动与一个或多个业务目标相关联,如图3所示。
Each realization is used to relate an activity in the business process to one or more business goals via formal tracing, as shown in Figure 3.
为了达到有意单元表示的目的,在这个单元上有一个带有错误默认值的非强制性概念性属性,如清单5所示。
For these purposes of intended unit representation, an optional conceptual attribute with a default value of false exists on a unit, as shown in Listing 5.
对于内容图表,从合适的包中拖拉所有的角色和角色,并通过将它们置于一个方框中来创建逻辑性的分组(代表范围),如图19所示。
For the Context diagram, drag all of the Use Cases and Actors from the appropriate packages, and create a logical grouping (represent the scope) by putting them in the square box, as Figure 19 shows.
故障发生后,如图3所示,数据库和协调器最后可能会重新启动并使用恢复日志和恢复规则来确保数据完整性。
After the failure, the databases and the coordinator can eventually restart and use their recovery logs and recovery rules to insure data integrity as illustrated in Figure 3.
我们使用此前生成的已编码uri来设置这个特殊请求的应用程序会话相关性,如清单3所示。
We use the encoded URI that we generated earlier to set application session affinity for this particular request, as shown in Listing 3.
可以使用这个日志服务设置优先性,最终如图2所示在指定的日志文件中记录相应条目。
You can use the log service to set priority and, finally, make the entry into the designated log file as shown in Figure 2.
如果有不同的版本存在,那么在基线之间将会有结构性的改变,如图19所示。
If different versions exist, there are structural changes between the baselines, as shown in Figure 19.
如果在安装过程中没有禁用管理安全性选项,则需要在安装过程中提供管理用户名和密码,如图2所示。
If the administrative security option was not disabled during installation then you would have provided the admin user name and password during installation, as shown in Figure 2.
区别信息性消息、警告消息和错误消息十分重要,如上述清单5所示。
It's important to distinguish between informational, warning, and error messages, as shown in Listing 5, above.
如图2所示,决策表在指定,分析和测试复杂逻辑性时起到很重要的作用。
As illustrated in Figure 2, decision tables are useful when specifying, analyzing, and testing complex logic.
这个询问关于追溯它的必要条件的请求的程序性方式可以十分直接地表达,如图10所示。
The programmatic way of asking a requirement about the requirements that trace to it can be expressed fairly straightforwardly, as Listing 10 shows.
这些问题导致组织需要定义和采用服务安全性治理流程,如图7所示。
These issues have led to the organization needing to define and adopt service security governance processes, shown in Figure 7.
英国石油公司主管人员说,如果压力示数开始降低,他们会停止这一压力测试,以缩小对油井管道造成损伤的可能性。
If pressure readings begin to fall, BP officials say they would stop the pressure test to minimize possible damage to the well pipe.
研究人员利用放射性示踪法确定,这种海蛞蝓确实能自己产生叶绿素,而不仅仅是从海藻那里偷取现成的色素。
The researchers used a radioactive tracer to be sure that the slugs are actually producing the chlorophyll themselves, as opposed to just stealing the ready-made pigment from algae.
要使它满足WS - i依从性,可删除标记并将其替换为标记,如清单17所示。
To make it WS-I compliant, remove the tag and replace it with tag as shown in listing 17.
对下面的说明稍加更改,就可以设置一个更具可用性的类似拓朴,如图9所示。
With relatively minor changes to the following instructions, you can set up a similar, more available topology, as depicted in Figure 9.
盖革计数器示出放射性粒子的高浓度。
The Geiger counter registered a high concentration of radioactive particles.
注意在每一个主机输入后,DB 2安装程序会进行有效性验证,以保证新主机的所有配置正确,如图15所示。
Note that after each host is entered, the DB2 installation program does validation checking to ensure everything is configured properly for the new host, as shown in figure 15.
里面内容都是一些来自学员们所认同的实用性的贴示,运用基于目标的培训并建立课程计划。
It's full of practical tips on getting buy-in from learners, using objective-based training, and creating lesson plans.
如果选择的服务器启用了安全性,会提示输入管理员证书,如图12所示。
If the selected server has security enabled, a prompt requests that the administrator credentials be entered, as shown in Figure 12.
如图9所示,注意您的ID属性现在拥有一个与其相关的附加性注释。
As Figure 9 shows, notice that your ID attribute now has an additional annotation associated with it because of your previous steps.
电子表格4,“堆栈”,计算堆栈的可用性,如下图8所示。
Spreadsheet sheet 4, "Stacks", calculates the availability of a stack, and is shown in Figure 8, below.
通过确定角色(如图2所示),就可以度量设计的易用性和有用性,而不需要向过多的用户征询意见。
By consolidating users into personas, as shown in Figure 2, these prototypical users provide a way to measure the usability and usefulness of a design without trying to satisfy too many users.
您还会看到我们用UML多重性[0..1]将三个属性置为可选的,如图11所示。
You can also see that we have identified three attributes as optional using UML multiplicity [0..1], as shown in Figure 11.
这提供了所有的可能性,比如使用下划线替代所有空格,如清单13所示。
This opens up all sorts of possibilities, such as replacing all Spaces with underscores, as shown in Listing 13.
这提供了所有的可能性,比如使用下划线替代所有空格,如清单13所示。
This opens up all sorts of possibilities, such as replacing all Spaces with underscores, as shown in Listing 13.
应用推荐