Two invocation lists are considered identical if they have the same order and the corresponding elements from the two lists represent the same method and target.
如果两份引动过程清单具有相同的顺序,并且两份清单的对应元素表示相同的方法和目标,则这两份引动过程清单视为相同。
To verify that the new documents exist in both databases, you can reuse the code from Listing 27 that compares the document lists of two databases.
要验证两个数据库中是否都存在新文档,您可以重用清单27 中的代码,该代码比较两个数据库的文档列表。
Read the elements from all translation units of the newly-generated XLIFF files and create two lists, one for each file.
从新生成的XLIFF文件的所有翻译单元中读入元素,创建两个列表,每个文件一个。
You could do the same two lists for 19th-century inventions and then compare the evidence from all four lists.
你可以为19世纪的发明做同样两个表单,然后对照这四个表单上的证据。
For example, [" best books 2002.". 2007] will return lists of best books for each of the years from 2002 to 2007 (note the two periods between the two Numbers).
例如,[“bestbooks 2002.” . 2007]会列出2002年到2007年间每年最好的书(注意两个数字间有两个英文句号)。
Two trekkers descending from Thorong La, the highest mountain pass in the world, in Nepal. The guide lists the country as the best value destination to visit in 2017.
两位徒步登山者从尼泊尔的陀龙要塞走了下来,陀龙要塞也是世界上最高的山口。这本旅游指南把这个国家评为2017年度最有价值的旅游目的地。
This paper lists the character frequency, word frequency and length of terms in the field of Information Technology in detail, and makes comparative analysis between terms from two dictionaries.
本文对两本信息技术术语词典中的术语的用字,用词、术语长度等进行了统计,并做了比较分析。
This paper lists several common network security failures, and analyzes how to protect the safe operation of the network from two aspects of management and technology.
列举了几种常见的网络安全故障,并从管理和技术两方面来分析如何保护网络的安全运行。
This paper lists several common network security failures, and analyzes how to protect the safe operation of the network from two aspects of management and technology.
列举了几种常见的网络安全故障,并从管理和技术两方面来分析如何保护网络的安全运行。
应用推荐