繁體版 English
登录 注册

系统日志

"系统日志"的翻译和解释

例句与用法

  • In this sixth of eight tutorials , you learn basic concepts of system logging , software packaging , and backup strategies
    在这一部分中,您将学习系统日志、软件打包和备份策略的基本概念。
  • To indicate where they are coming from . this option is perfect for monitoring system logs , for example ,
    这个选项用于监视系统日志再合适不过,譬如,在单独的终端窗口(或单独的控制台)中执行的
  • Supporting system catalog output , sending users s authentication catalog and access to the appointed servers through standard syslog way
    支持系统日志标准输出,可通过标准的syslog方式将用户的认证日志和访问连接日志发送到指定服务器
  • If you have chosen to reject this order , you ll see in system log that the activity send rejection mail has been processed as shown in figure 18
    如果您已经选择拒绝该订单,那么将在系统日志中看到行为send rejection mail已经得到了处理,如图18所示。
  • For instance , you ll probably want to plug in a different user name and password for each unique user logging in to the system , or some user - specific parameter such as session identifier or product id
    例如,您可能需要将每个不同的登陆用户的用户名称和密码插入到系统日志中,或是一些用户特定的参数,例如会议标示服或是产品id 。
  • And these modules can also be divided into some themselves sub - modules . in the 4th chapter , we describe the sub - system ' s objects , modules design and implementation in detail . configuration of test scene , creation of test progress , implementation of system real - time performance , integral alarm technology , data sampling in different frequency , privilege management of operators , record of system log and etc . are emphasized in the chapter
    在第四章,先对第三章中发现的对象:试验台架、通讯串口、测控设备、测点以及发动机型号进行了详细的分析并给出了它们的实现;然后结合到各个模块和子模块的功能进行了分析和详细的设计,包括试验场景的配置、模拟试验场景的建立、系统实时性的实现、积分报警的实现、数据采集和存储、操作员的权限管理和系统日志记录等。
  • In order to make good use of logs to implement computer forensics , there are two problems needed to be solved : first , protecting the log system in time and collecting them to accord the procedure of computer forensics . second , how to analyse the logs to find out the " trail " of crime , that can be used as valid electronic evidence in court
    要很好地利用日志来实现计算机取证,有两个问题需要解决:一是及时地对系统日志进行保护,符合计算机取证的程序来提取日志;二是如何分析日志,找出犯罪者的“痕迹” ,作为有效的电子证据展示给法庭。
  • Integrating practical application environment , it presents effective implement method of this replication system , and introduces system structure , basic class and replication part design . this paper also thinks over the design of safe management , failure disposal and system log . finally , according to
    针对课题实际应用环境,对该复制系统进行了实现,介绍了系统的结构、基本类设计和复制环节的设计,同时考虑了系统的安全管理、意外处理和系统日志等方面的设计。
  • ( 4 ) to record the running situation . and this software was developed by c + + under microsoft vc + + 6 . 0 and is composed of 5 modules : the initial module to finish the video card and i / o card initializations ; the start - stop module to create and destroy the thread used to supervise light room and process image ; the image - capturing module to capture the image from ccd to ram ; the image processing module to get classified information through analysis ; the signal i / o module to send the signals to the outside and also to send outer information to the inside ; the system log module to record the running situation of the system and the quantity of detected eggs
    系统由5个模块组成:初始化模块完成图像采集卡和数字量i o卡的初始化;启动停止模块建立和消亡用于监控光室状况和进行图像处理与分析的线程;图像采集模块将光室中所成的像通过ccd经由图像采集卡采集到主机内存中;图像处理模块对主机内存2001硕士论文摘要中的图像进行分析,得出所需要的分级信息;信号1 / 0模块将得出的分级信号送出至计算机外部,同时也将计算机外部的控制反馈信息传至计算机内部;系统日志模块记录系统的启动运行情况和当前系统检测鸭蛋的数量。
  • 更多例句:  1  2  3
用"系统日志"造句  
英语→汉语 汉语→英语