• 命令节约了19键击

    That single command has saved 19 keystrokes!

    youdao

  • 键击专用输入管理器处理

    Keystrokes are handled by a dedicated input manager.

    youdao

  • 设置获取用于调用命令键击列表

    Sets or gets the list of keystrokes used to invoke the command.

    youdao

  • cd转移可以非常时间内为节约数千次

    The cd shuffle can save you thousands of keystrokes in a very short time.

    youdao

  • 收取费用,他们自定义键击记录器正是需要做的事。

    For a fee, they will customize Master Keystroke Logger to do exactly what you need it to do.

    youdao

  • 使用相对路径意味着更少键击尽管取决于哪个目录前往哪个目录。

    Using the relative path often means fewer keystrokes, although that depends on the directory you are going from and the one you're headed to.

    youdao

  • 可以组合送到活动应用程序等待处理消息

    To send keystrokes or combinations of keystrokes to the active application and wait for the keystroke messages to be processed.

    youdao

  • 用户使用图形用户界面修改工作项窗体每次字段输入键击都会设置一个

    When a user USES the graphical user interface to modify a work-item form, a new value is set every time that a keystroke is entered for a field.

    youdao

  • 设置引导设备需要适当配置BIOS;引导过程中可能还需要一个特殊键击以便显示一些选项

    Setting up such alternate boot devices requires your BIOS to be appropriately configured and may require a particular keystroke during boot to display choices.

    youdao

  • 依赖其他编程功能输入命令绑定)可能在此作为常规键击公开之前对其进行处理

    Other programming features that rely on keystrokes such as input and command bindings will potentially handle the keystroke before it is exposed as a general keystroke.

    youdao

  • 例如一些字母单词容易同时出现——如果未知键击跟随在“t”之后,那么h”的可能性x”大很多

    For example, certain letters or words are more likely to occur together-if an unknown keystroke follows a "t", it is much more likely to be an "h" than an "x".

    youdao

  • 这一新的方法沿用了语音识别软件研制录音中将所有发音类似的归类办法由此产生了键击表。

    The new approach employs methods developed for speech-recognition software to group together all the similar-sounding keystrokes in a recording, generating an alphabet of clicks.

    youdao

  • 一旦入侵成功,电脑能够暗中下载其它代码这些代码记录入侵电脑数据,这将给潜在宽广网络进入权

    Once so compromised, a computer can surreptitiously download other code that can log a victim's key strokes, giving an attacker a path to potentially wide network access.

    youdao

  • 一旦入侵成功,电脑能够暗中下载其它代码这些代码记录入侵电脑数据,这将给潜在宽广网络进入权

    Once so compromised, a computer can surreptitiously download other code that can log a victim's key strokes, giving an attacker a path to potentially wide network access.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定