The list is used to match the security method supported by the server and employed during subsequent system calls under this mount point.
这个列表用于匹配服务器支持的安全方法。 此外,随后在该装载点下发生系统调用时也用到该列表。
For Brittany Shoot, 27, an under-employed freelance writer based in Copenhagen, Denmark, it's all the work she could be doing or should be seeking.
布列塔尼,27岁,是丹麦哥本哈根的一名自由撰稿人,每天考虑能做什么和应该做什么,就是她全部的活儿。
The article also explained how to determine which invocation mechanism is employed under the covers, because it affects how exceptions are treated.
本文还阐述了如何确定内部使用了哪种调用机制,因为调用机制会影响处理异常的方式。
应用推荐