它应该返回两个列,第一列中包含用户名,而第二列中包含密码。
It should return two columns, the first holding a username and the second holding a password.
如果快速键入密码的第一部分,但是由于键入数字或切换大小写而导致第二部分的键入速度减慢,则将测量连贯性。
If you type the first part of your password rapidly, but the second part slowly due to Numbers or case shifts, the consistency will be measured.
它需要与第二个参数内所指定用户的密码相匹配。
This needs to match the password used for the user identified in the second parameter.
不过,在连接到EIS之前,向导的第二个页面要求提供连接信息(如用户名和密码),如图3所示。
However, before it connects to the EIS, the second page of the wizard asks for connection information like a username and password as Figure 3 shows.
因为这个密码不能第二次使用,故而从理论上来说,即使黑客安装了密码嗅探器也没关系。
The theory is that it doesn't matter if a hacker is running a password sniffer, since the password won't work a second time.
另外,我指定我的用户名mito和一个空的密码分别作为第二个和第三个参数。
Additionally, I am specifying my username, mito, and an empty password as the second and third arguments, respectively.
第3行—以用户名“newusername”和第二个参数指定的密码创建一个新用户。
Line 3 - This creates a new user with the username as' newusername 'and with the password specified as the second argument.
如果CVS管理员为您提供了第二位用户的登录ID和密码,请确保在Add CVS Repository对话框(图11)中使用该登录ID。
If the CVS administrator provided you an additional login id and password for the second user, be sure to use that login id in the add CVS Repository dialog (Figure 11).
第二个变化是在安装openssh-server包时,会提示设置新的根密码。
The second is that, when you install the openssh-server package, you are prompted to set a new root password.
第一个参数提供将被使用的密钥库的位置,第二个参数提供访问密钥库所需的密码。
The first parameter provides the location of the keystore that will be used, and the second provides the password required to access the keystore. Consequently, the Java command would be of the form
其模式通常采用这一形式:第一月的密码是“cat”;第二个月的密码是“cat1”;第三个月的密码是“cat2”,依次类推。
The pattern usually takes this form: first month password is "cat"; second month password is "cat1"; third month password is "cat2"; and so on.
第一个无线网需要我在网站注册,而第二个则不需要密码。
The first one required me to register on a website, but the second one didn't require a password.
为了验证有人进入用户ID是雇农,第二个识别、密码,只知道雇农和系统本身,由用户输入。
In order to verify that someone entering that user id really is that peon, a second identification, the password, known only to that peon and to the system itself, is entered by the user.
在这些多态性变异位点中,出现在遗传密码子第一和第二位上的碱基替换率分别为36.76%和35.29%。
Among the polymorphic sites, the nucleotide substitutions in the first and second positions of the codons accounted for 36.76% and 35.29%, respectively.
对于第二个风险(财务顾问在远程访问网络时面临密码被盗的风险),安全风险管理小组会得出类似的值。
For the second risk, the risk of financial advisers having their passwords compromised when accessing the network remotely, the Security risk Management Team would find similar values.
这个量测的动作会清除该处的资讯,但因缠结的缘故,不论粒子间的距离有多遥远,该资讯会以密码的形式储存在第二个粒子上。
The measurement erases the information from its original location, but because of entanglement, that information resides in an encoded form on the second particle, no matter how distant it may be.
在已结束的对是否到达第二测试位置(18)的检验得到肯定结果的前提下,要求输入密码(PIN);
The input of a secret code (PIN) is only requested if the check that the second test position has been attained (18) is positive.
第二次迅速的时候,设定密码-现在当你有密码的提示,设置为隐藏密码,它会确认你的密码才接受。
Second prompt when setting password - Now when you have the password prompt set to hide the password, it will confirm your password before accepting.
因为没有人来输入密码,执行必须等到第二天早上,当我进入并提供密码。
Since there is no one around to enter the password, the execution has to wait until morning when I get in and provide the password.
线性码的广义汉明重量谱描述了码在第二类窃密信道中传输的密码学特征。
The Generalized Hamming Weights (GHW) of linear codes characterize the cryptography performance of the code on the wire-tap channel of type two.
先导链与滞后链在第一、第二、第三密码子碱基使用频率基本一致且显著正相关。
The result show:1 there is same bases usage frequency in coding sequence between leading strand and lagging strand 2 There also same bases usage frequency in first codon, second codon and third codon.
本课程第三学年第二学期开设,计划学时48,先修课程为:计算机网络,密码学。
The course will be taught in the second semester of the third academic year, which includes 48 hours. Its prerequisite courses include Computer Network and Cryptography.
第二条中国公民、法人和其他组织使用商用密码产品的行为适用本规定。
Article 2 These Provisions shall apply to conduct regarding the use of commercial encryption products by Chinese citizens, legal persons and other organizations.
第二条商用密码产品销售活动适用本规定。
Article 2 the present Provisions shall apply to the activities of selling commercial cipher products.
第二章介绍基本的应用密码学算法和密码协议,包括对称加密算法、非对称加密算法、散列函数、数字签名技术和密钥管理协议。
In chapter 2, the basic algorithms and protocol of applied cryptography are introduced here, including symmetric-key cryptography, public-key cryptography, hash functions and key management protocols.
第二章介绍基本的应用密码学算法和密码协议,包括对称加密算法、非对称加密算法、散列函数、数字签名技术和密钥管理协议。
In chapter 2, the basic algorithms and protocol of applied cryptography are introduced here, including symmetric-key cryptography, public-key cryptography, hash functions and key management protocols.
应用推荐