Shadow upon database 数据库映射
Many users employ a shadow copy of their database (Figure 4) to support large and ad-hoc queries against the operational data.
许多用户使用数据库的影子副本(图4)支持基于操作数据的大型专用查询。
Password file-base authentication: authentication is based on the password and shadow files or interaction with Network Information System (NIS), on the machine where the database server is installed.
基于密码文件的身份验证:身份验证基于安装数据库服务器的机器上的密码和影子文件,或者与Net work Information System (NIS)的交互。
This graph shows the number of messages that were in the database I was running a test on, plotted over time. I added in a logo, a drop shadow effect, and a stats table of the test run.
图 7 是一个线图,显示了测试的数据库中的一些信息,添加了一个徽标、阴影效果和测试的统计表。
应用推荐