一个命令就节约了19次键击!
键击由专用的输入管理器处理。
设置或获取用于调用命令的键击列表。
Sets or gets the list of keystrokes used to invoke the command.
cd转移可以在非常短的时间内为您节约数千次键击。
The cd shuffle can save you thousands of keystrokes in a very short time.
收取费用,他们将自定义主键击记录器做的正是你需要做的事。
For a fee, they will customize Master Keystroke Logger to do exactly what you need it to do.
使用相对路径意味着更少的键击,尽管那取决于您要从哪个目录前往哪个目录。
Using the relative path often means fewer keystrokes, although that depends on the directory you are going from and the one you're headed to.
可以将键击或组合键击发送到活动应用程序,并等待处理键击消息。
To send keystrokes or combinations of keystrokes to the active application and wait for the keystroke messages to be processed.
用户使用图形用户界面来修改工作项窗体时,每次为字段输入一个键击时都会设置一个新值。
When a user USES the graphical user interface to modify a work-item form, a new value is set every time that a keystroke is entered for a field.
要设置这类引导设备,您需要适当配置BIOS;在引导过程中可能还需要一个特殊键击,以便显示一些选项。
Setting up such alternate boot devices requires your BIOS to be appropriately configured and may require a particular keystroke during boot to display choices.
依赖键击的其他编程功能(如输入和命令绑定)可能会在此键击作为常规键击公开之前对其进行处理。
Other programming features that rely on keystrokes such as input and command bindings will potentially handle the keystroke before it is exposed as a general keystroke.
例如,一些字母或单词更容易同时出现——如果一次未知的键击跟随在“t”之后,那么它是“h”的可能性就比是“x”大很多。
For example, certain letters or words are more likely to occur together-if an unknown keystroke follows a "t", it is much more likely to be an "h" than an "x".
这一新的方法沿用了为语音识别软件研制的在录音中将所有发音类似的键击归类的办法,由此产生了一个点击的键击表。
The new approach employs methods developed for speech-recognition software to group together all the similar-sounding keystrokes in a recording, generating an alphabet of clicks.
一旦入侵成功,电脑能够暗中下载其它代码,这些代码会记录入侵电脑的键击数据,这将给攻击者一条潜在宽广网络进入权。
Once so compromised, a computer can surreptitiously download other code that can log a victim's key strokes, giving an attacker a path to potentially wide network access.
一旦入侵成功,电脑能够暗中下载其它代码,这些代码会记录入侵电脑的键击数据,这将给攻击者一条潜在宽广网络进入权。
Once so compromised, a computer can surreptitiously download other code that can log a victim's key strokes, giving an attacker a path to potentially wide network access.
应用推荐