The key sequence Ctrl-A will invoke KDB from the serial console.
按键序列ctrl - A将从串行控制台调用KDB。
The results of experiment suggest that the key sequence is independently and weak correlation.
实验结果表明,由该系统产生的密钥序列具有均匀性,相关性小的特点。
Note: Assigning a key sequence, such as Ctrl + 4, provides a shortcut for executing your new action.
注意:通过分配键序列(如ctrl + 4),可提供执行新操作的快捷键。
All that remains is to set up a key sequence (; s in this example) to call the ToggleSyntax function.
剩下的工作就是设置一个关键的序列(本例中为;s)来调用ToggleSyntax函数。
An example would be retrieving and caching the next available batch of keys from a primary key sequence table.
例如,在从主键序列表中检索并缓存下一批可用的键值时。
With these steps, you can display a back trace of the current running process and all processes using the magic key sequence.
遵循这些步骤,您便可以显示当前运行的进程和所有使用魔术键控顺序的进程的回溯跟踪。
Scenario 4 displays information for the component that is causing a hang by using a magic key sequence available on Linux.
在第4种情况中,我们使用Linux上提供的魔术键控顺序(magic key sequence)来显示引发挂起问题的组件的信息。
A special piece of software called an input method converts each key sequence into a single character or a series of characters.
有一种特别的软件叫输入法,它可以将每个键盘序列转换成一个字符或一系列字符。
With a simple key sequence — such as SHIFT-CTL-F on Windows — the code is automatically formatted according to your preferred style.
利用简单的按键顺序组合——如Windows中的SHIFT -CTL - f——代码会自动地根据您的首选式样格式化。
Nonlinear combined sequences as a kind of the important key sequence generators, its design and analysis are always hotspot and difficulty of stream cipher.
非线性组合序列作为一类重要的密钥流生成器,其设计和分析一直是序列密码研究的一个重要方向。
This file also contains information about what to do when a power failure occurs (if the system supports it) and how to react when it detects the Ctrl-Alt-Delete key sequence.
这个文件还包含了有关出现电源故障时执行的操作(如果系统支持)、以及在检测到Ctrl - Alt - delete键序列时应该如何反应的信息。
Another key insight that the working group had during the development of the sample application had to do with the sequence diagrams.
在样本应用程序的开发过程中,工作组取得的另一个重要经验与序列图有关。
The application USES entities with table identity or database sequence key generation.
应用程序使用带有表标识或数据库序列密钥生成器的实体。
Otherwise, a new key value is taken from the sequence and used for both, a new entry in the dimension table and as a foreign key in the fact table.
否则,从序列获取一个新的键值,用它作为维表中新条目的主键和事实表中的外键。
This command sequence specifies an initial password of "jamespass" required by subsequent commands to access the private key associated with the alias "james" in the keystore "jamesKeyStore."
这个命令序列指定了一个初始密码“jamespass”,后续的命令在访问keystore “jamesKeyStore”中与别名“james”相关联的私钥时,就需要这个密码。
Performing a similar sequence as in step 2, above, change the output page by adding the message key result.title to the header, using Format => Paragraph => Heading 1 to format the header.
按照与上面的步骤2中类似的顺序来更改输出页面,为此,您可以将消息键result.title 添加到Header,使用Format =>Paragraph =>Heading1来安排 Header的格式。
The \ m sequence refers to the 'meta' key (special on some keyboards, or usually the Alt key or the Escape key).
m序列引用“Meta”键(某些键盘上的专用键,或者通常为alt键或escape键)。
Controlling the ETL work in this manner can be useful for guaranteeing the proper sequence for loading data warehouse tables that contain primary or foreign key dependencies.
以这种方式控制ETL工作,对于保证按适当次序装载包含主键或外键依赖的数据仓库表十分有用。
Bear in mind that the sequence in Listing 1 requires you to enter a password if you haven't already exchanged your public key with the remote host.
请记住,如果您尚未与这台远程主机交换您的公钥,那么清单1中的序列需要您输入一个密码。
However, the sequence is the key: Users are forced to interact to progress throughout the site.
尽管如此,关键是顺序:用户被迫加入网站处理过程。
The key is typically a random sequence of bits; its size categorizes the strength of the encryption algorithm.
密钥一般是 0 或 1的一个随机序列;其大小区分了加密算法的能力。
In our ErrandBean, the primary key is an integer — a sequence number we call the errand ID.
在我们的ErrandBean中,主键是一个整数—我们称之为差事标识的序号。
All messages sent within the Sequence must therefore provide proof that they possess the key that the STR references, otherwise the RM Destination will discard them.
因此,序列内所有发送的消息必需保证它们拥有STR引用的key,否则R m目的地端将会把它们丢弃。
The key problem of the excavation of the main carven system is to determine the best excavation sequence and excavation options according to the concrete features of the project.
如何结合工程具体特点,确定最优的爆破开挖程序和开挖方法,这是主厂房系统爆破开挖的关键所在。
For that effect, JSON defines the following main data structures: number, string, Boolean (true and false), array (an ordered sequence of values), object (collection of key value pairs), and null.
为了实现该目的,JSON定义了以下主要数据结构:数字、字符串、布尔值(真或假)、数组(值的有序排列)、对象(键值对集合)和null。
In order to create or manipulate queue items, you need the Secret Access Key (40-character, alphanumeric sequence).
为了创建或操作队列项,您需要使用SecretAccessKey(由40个字母和数字组成)。
The Access Key ID is the key (20-character, alphanumeric sequence) needed to request authentication or to read queue items.
AccessKeyID(由 20 个字母和数字组成)是请求身份验证或读取队列项所需的密匙。
Taking dual chaotic inter-perturbed system as sequence key generator, an improved quantization method for converting chaotic sequence to binary sequence was put forward.
以双混沌互扰系统作为序列密钥发生器,提出一种改进的二值序列量化方法。
Taking dual chaotic inter-perturbed system as sequence key generator, an improved quantization method for converting chaotic sequence to binary sequence was put forward.
以双混沌互扰系统作为序列密钥发生器,提出一种改进的二值序列量化方法。
应用推荐