英文login表达的是什么意思
英文log in表达的是什么意思
英文log in看似简单,但是它表达的是什么意思呢?下面是店铺给大家带来的英文log in表达的是什么意思,希望能帮到大家。
英文log in表达的意思
英 [lɡ in] 美 [lɡ n]
1. 注册:问: 有没有办法在SunOS4.1.x系统起动(boot)后, 自动地用某一个用户ID注册(log in),然后自动地启动某一应用程序(如netscape)
1. 登录,登入(计算机系统)
When someone logs in or logs on, or logs into a computer system, they start using the system, usually by typing their name or identity code and a password.
e.g. Customers pay to log on and gossip with
顾客付费后登录系统和其他用户聊天。
e.g. They would log into their account and take a look at prices and decide what they'd like to do.
他们会登入自己的账户,查看价格后再决定怎么做。
英文log in的单语例句
1. Keep a log of emails that are threatening and abusive in case you need to stand up your claim.
2. The colleague who took her place in her absence noticed in Cai's chat log that Cai had been talking about purchasing office supplies.
3. Ji and his colleagues log long hours both in and out of the freezer every day.
4. To participate in the vote, log on to the Xicheng district government's website.
5. He has the responsibility to edit his postings before the millions of netizens log in.
6. Among the Lenovo computers'features is software that recognizes users'faces, allowing them to log in to their PC and various applications without passwords.
7. A rotating team of officials log in as " Chongqing procurator " to collect information and give feedback.
8. And the main commodities imported by China from Fiji are raw sugar in the past and saw log and some synthetics.
9. HANGZHOU - In addition to going directly to a police station, fugitive suspects can also log onto a police website and submit an application for surrender.
英文log in的.双语例句
1. At first This paper formulates the necessity for depurating network information content, and introduces the history of information security and study point in information security. Also this paper analyses in detail the key technology of content filtering such as data frame capture, bridge, network protocol analysis and content analysis. And then this pape
r comes up with the solution for content filtering facing application layer which is based on the technology of protocol analysis and format conversion in combination with text filtering techonology of Multiple Patterns Matching..Also this paper amplifies on the design and the implement method of each module. Finally this paper introduces how the client of content filtering system manages the keywords and log and makes suggestion for the improvement of the system.
本文首先阐述了对网络信息内容净化的必要性,介绍了信息安全的发展过程以及当前信息安全方面的研究重点,详细分析了内容过滤的关键技术,如数据帧捕获、网桥、网络协议分析和内容分析等方面的技术,然后提出了在Windows2000下实现基于协议分析技术,结合多模式匹配的文本过滤技术,面向应用层的内容过滤解决方案,并给出了内容过滤引擎的详细设计以及各个模块的实现方法,最后介绍了内容过滤系统客户端对有害信息关键词和日志的管理以及对本系统改进的一些建议。
2. Hey guys i'm bridget daly, here at the twilight premier in west way. this is madness(or magnets, i'm not sure). this people had been here since last night. it's crazy, before we ge
t the scoop on the right card board, log on to hollyscoop. com, become an illustrator, and this could be use in the right hand of right card bin, let's go and get the scoop.identity matrix是什么意思
嘿,你们好,我是bridget daly,这里是在西边首要暮光之城的宣传地,着真让人发疯了,这些粉丝们从昨天晚上开始在这等,真是太疯狂了,在我们进去以前,登陆hollyscoop,成为其中一个解说者,然后这个可以在右手边的箱子里使用,让我们进去然后要到采访吧!
3. On pre-stack seismic reservoir prediction is concerned, AVO application can be grouped into two parts: One is to study the gas-bearing reservoir in response to the unusual characteristics of the AVO based on log data on seismic reflection through the AVO forward modeling. And using it as the basis for guidance inversion AVO anomalies to explain the properties based on the pre-stack seismic data; Second, proceeding AVO inversion based on pre-stack seismic data, and Extracting AVO abnormal attribute parameters,
就叠前地震储层预测而言,AVO方法的应用可分作两个部分:一是以测井资料为基础,基
于地震反射原理通过AVO正演模拟来研究含气储层的AVO异常响应特征,并以此为依据指导对基于叠前地震资料反演AVO异常属性的解释;二是基于叠前地震资料进行AVO反演,提取AVO异常属性参数,基于泊松比和流体因子特征来预测储层的分布和含气性状况。
4. In order to simulate the real radar clutter environment, the use of zero-memory nonlinear transformation method of Rayleigh, log-normal distribution, K-distribution and the Weibull distribution where the clutter of different simulation and put forward A one-dimensional approach will be extended to a clutter sequence of two-dimensional sequence, a two-dimensional simulation of the peak to clutter Doppler frequency and space with the correct move frequency.
为了模拟真实环境中的雷达杂波,使用零记忆非线性变换法对瑞利、对数正态分布、K-分布和韦布尔式中不同分布的杂波进行了仿真,并且提出一种方法将一维杂波序列扩展到了二维序列,仿真出的二维杂波的峰值能够随着多普勒频率和空间频率正确移动。
5. A NEW BASE OF OPERATIONS: Revival Incidents; Going West in a Prairie Schooner, ... Following this he sat on a near-by log, without a stitch of clothing,

版权声明:本站内容均来自互联网,仅供演示用,请勿用于商业和其他非法用途。如果侵犯了您的权益请与我们联系QQ:729038198,我们将在24小时内删除。