It is not necessary to establish yourself as top dog or leader of the pack by using extreme measure.
没有必要用极端手段来确立自己领头羊或群体领导人的身份。
It is not necessary to establish yourself as top dog or leader of the pack by using extreme measures.
没有必要用极端手段来确立自己领头羊或群体领导人的地位。
It is inefficient; by using only 6 bits of each byte, it adds about a third to the length of a message.
它是低效的;通过使用每字节仅6位的编码,它添加了大约消息长度的三分之一。
It is a powerful word processor in general, and by using it, you can use the same tool for XML document development.
它从总体上说是一种功能强大的字处理器,通过使用它,可以使用相同的工具来进行XML文档的开发。
It is matched by a receiver using the same algorithm.
它由一个使用相同的算法的接收器匹配。
The above expression will create the same effect as the previous back reference example, but by instead using named groups. It is also significantly easier to read.
上面的表达式将产生和前面的反向引用同样的效果,但通过使用命名组,这将明显地更便于阅读。
But by using base media, the operating system is guaranteed to be just it was when it rolled off the factory floor.
但是,通过使用最基本的安装介质,可以保证操作系统恢复到它出厂时的状态。
These files can be in some specific form (discussed later in this article) that is understood by the IDS so that it can be accessed using SQL queries.
这些文件可能采用某种IDS能够理解的形式(本文将在稍后讨论),以便可以通过SQL查询访问。
They do this by formulating business conditions and automating them using software applications, which is where the it experts come in.
为实现此目的,保险行业使用软件应用程序来系统表达业务条件并自动化这些条件,这正是IT专家派上用场的地方。
After starting in the automatic mode, the progress bar keeps updating the status of the task until it is stopped by using specified time interval and percentage increment values.
在自动操作模式中启动以后,这个进度工具条将会不断地更新这个任务的状态,直到使用特殊的时间间隔和百分数增长值使它停止为止。
The electronics industry is taking advantage of micro and nano-fabrication technology by using it in bio-technology sensing, optical filtering and light control components.
电子工业正利益于微米和纳米制造技术,将其应用在生物技术传感、光学过滤和灯光控制组件方面。
The stylesheet starts by matching the root element of the document that it is passed, using the regular expression /*.
样式表将首先使用正则表达式 /*匹配所传递的文档的根元素。
Once the XML document is received by the client, it is, before being displayed, transformed using an XML stylesheet (5 in Figure 3).
客户机获取XML文档之后,在显示文档之前,用一个xml样式表转换文档(图3中的5)。
In many cases, it is possible to write a query by using either a FLWOR expression or a path expression.
在很多情况下,可以任意使用FLWOR表达式或路径表达式编写查询。
The way he suggests to make it clearer is by using a matrix.
他建议的方法是使用矩阵。
More importantly, by using the NIO package it is possible to access a file as a CharSequence.
更重要的是,通过使用NIO包,将一个文件作为CharSequence 进行访问是可能的。
It is amazing how much development time is saved by using NHibernate.
真不知道使用NHibernate将为我们节省多少开发时间。
In AIX 5l Version 5.3, it is set by the varyonvg command, using the flag -m.
在AIX5lVersion 5.3中,通过varyonvg命令对其进行设置,并且使用- M标志。
Such exclusive access is a new feature of Windows nt 4.0 SP4 and later, and it is implemented by using the SO_EXCLUSIVEADDRUSE option.
独占访问是一项新功能的WindowsNT 4.0SP 4及更高版本中,并它实现使用SO_EXCLUSIVEADDRUSE选项。
The article is geared toward small - to medium-sized applications, because it implements simple security by using the properties file login module.
本文适用于小到中型的应用程序,因为它通过利用属性文件登录模块实现了简单的安全。
Today, a lot of activity is still going on with the latest GTK+ version -- 2.8 -- and while GIMP certainly continues to be one of the best-known programs using GTK+, it is by far not the only one.
今天,在GTK+的最新版本 —— 2.8 版上,仍然在进行许多活动,同时,GIMP无疑仍然是使用 GTK+的最著名的程序之一,不过现在它已经不是惟一的使用 GTK+ 的程序了。
It is a good idea to avoid this problem by using only empty directories as mount points.
要避免这类问题,一个较好的办法就是只使用空目录作为挂载点。
For example, by using multiple motors on the same shaft it is possible to get more than one degree of freedom.
例如,通过在同一传动轴上使用多台电机,可能使该机构获得一个以上的自由度。
The name of the file is removed from the file system, and its storage space is recovered by the operating system when the program using it closes the file.
这将从文件系统中删除该文件的名称,当使用该文件的程序关闭它时,操作系统可以重新获得其存储空间。
Before the text data is added to the index, it is processed by an analyzer (using an analysis process).
在将文本数据添加到索引前,由分析程序(使用分析过程)进行处理。
The encryption using crypto algorithms is ensured by the fact that it is computationally infeasible to generate plaintext that matches the hash value.
使用加密算法的保密性由这样一个事实保证,即生成与哈希值匹配的明文在计算上是不可行的。
An application's entire configuration is characterized by its configuration interfaces; using modern development tools, it is easy to identify which fields are used by what code.
应用程序的整个配置都借助于它的配置接口;通过使用现代开发工具,很容易识别哪些代码使用了哪个字段。
An application's entire configuration is characterized by its configuration interfaces; using modern development tools, it is easy to identify which fields are used by what code.
应用程序的整个配置都借助于它的配置接口;通过使用现代开发工具,很容易识别哪些代码使用了哪个字段。
应用推荐