As you read your textbook and notes, use highlighters and sticky notes to remind yourself of which key information you need to remember.
当你阅读课本和笔记时,用荧光笔和便利贴提醒自己需要记住哪些关键信息。
One of the ten information specialists will answer your question even if the question has multiple parts, and even if you're missing some key information.
即使问题涉及多个方面,即使你遗漏了一些关键信息,十位信息专家中的一位也会回答你的问题。
Key information supplied to the Data Handler includes.
向数据处理程序提供的主要信息包括。
Previewing key information and then sleeping on it increases retention 20 to 30 percent.
预览重要信息之后把其它留到第二天记忆,这使记忆保留增加20%到30%。
This section describes the key information that needs to match with the existing installation.
本节将描述匹配现有安装所需的关键信息。
If there is too much information, then the meaning and impact of key information becomes obscured.
如果有过多的信息,那么主要信息的意义和影响就变得模糊。
It is very helpful to provide some key information in the actual output that is generated by the script.
在脚本生成的实际输出中提供一些关键信息是非常有用的。
In the following example, an SQL statement captures foreign key information and generates DROP statements.
在下面的示例中,一个sql语句将捕捉外键信息并生成drop语句。
First, the signer may not wish to reveal any key information to all of the document processing parties.
首先,签名者可能不希望向所有文件处理方披露任何金钥讯息。
This modern dream theory suggests dreaming is a way to file away key information and discard meaningless data.
这套现代的梦的理论认为梦是归纳主要信息,丢弃无意义数据的一个方法。
The systems collected key information which was then transferred to two airborne processors for post-test analysis.
该系统收集关键信息,然后转移到两个机载处理器进行测试后分析。
To generate the private and public key information manually, use the keytool from the command line, as in Listing 1.
要手动生成私有、公共密钥信息,可以从命令行使用keytool,如清单1所示。
Figure 17 shows an example of how this is configured for the key information, with each direction labelled as a and b.
图17显示了如何为密钥信息配置DN和别名的示例,其中每个方向分别标记为a和b。
The client authenticates the encrypted/signed data by passing the corresponding key information to the service provider.
客户机通过将相应的密钥信息传递给服务提供程序来认证经过加密或签名的数据。
Now that the scripts, configuration, and key information are in place, you need to copy the information to each machine.
现在脚本、配置和密匙信息已就绪,需要将这些信息复制到每台机器。
Another key information file for XPI is install.rdf, Listing 5, which contains instructions for installing the extension.
XPI的另一个关键信息文件是install . rdf,如清单5所示,其中包含了扩展安装说明。
The measures are very important to the stakeholders, and may become key information into system reports dedicated to them.
对涉众来说量度是非常重要的,并且可能成为给予涉众的系统报告中的重要信息。
That user-to-tenant relationship is the key information that is used to restrict the data that can be accessed by the user.
这种用户与租户的关系是非常重要的信息,用于限制用户可以访问的数据。
If a malicious user gets hold of this key information, then the security of that host machine can be compromised very easily.
如果恶意用户获得了这些密钥信息,那么主机的安全性就很容易受到威胁。
The key information required to create any user interface on top of a model is to understand the relationships between the models.
在模型上创建任何用户界面所需要的关键信息都是要理解模型之间的关系。
In fact, some key information derived from WSDL is added to the SOAP.Context part of the tree when the tree is created at run time.
事实上,当在运行时创建树时,将会向树的SOAP. Context部分添加某些从WSDL派生的关键信息。
Correlation sets allow you to define key information that can be used by a client to interact with specific instances of a process.
Correlationsets允许您定义关键信息,客户端可以使用这些信息与流程的特殊事件进行交互。
People were even able to identify key information about the recordings when distracting noises were added to make the task harder.
即使为了加大难度,加入噪音干扰,人依然能识别记录中的关键信息。
The key information could be either a data instance, such as a particular customer, or metadata, such as specifications of products.
关键信息可能为数据实例(如特定的客户),也可能是元数据(如产品的规范)。
Right now our social graph (whom we are connected to and their key information like email addresses) is mostly held captive by Facebook.
现在,Facebook获知了我们大部分的社交网络(我们的联系人和他们的联系方式如email地址),Facebook正经历着越来越多的压力去把这些信息变得便携。
The OV-7 reflects the structure and flow of key information being used to achieve the functionality expressed in the Enterprise use Cases.
OV - 7反映了用于达到企业用例中所表达的功能的关键信息的结构和流。
It covers key information that administrators should know about what differentiates the two systems and shows how you can start running quickly.
本文包含了管理员应该了解的关于这两个系统的差异的关键信息,并演示了如何快速开始运行。
Prevent denial of service attacks: Using XKMS to get key information is useful if it is available when needed and within a reasonable amount of time.
防止服务的抵赖攻击(denial of service attack):使用XKMS来获取密钥信息比较有用,前提是XKMS在需要的时候可用,并且这一过程能在合理的时间内完成。
An application security posture questionnaire, a detailed worksheet that helps extract key information about the security posture of off-the-shelf software.
一个应用软件安全情况的调查问卷表,是一个详细的工作表,可以帮助解析出架下的安全性情况的关键信息。
Step 4: Create an Encryptor object with a data encryption key, a key encryption key, their associated algorithms, and key information to be included in the output.
步骤4:利用一个数据加密密钥、一个密钥加密密钥、与这两个密钥相关联的算法、以及将来包含在输出信息中的密钥信息,根据它们来创建一个Encryptor对象。
应用推荐