key code造句
- A separate personal identification number key code
第二层:独立的个人识别号码 - Property which combines the key code and modifier
属性(它组合键代码和修改键) 。 - Enter the key code , and click submit order
输入个人识别号码,然后按递交。 - I ' m at the vault . i need that key code
我到金库了,我需要密码 - To combine a key with alt , precede the key code with
若要将一个键与alt组合,请在该键代码之前加上 - To combine a key with ctrl , precede the key code with
若要将一个键与ctrl组合,请在该键代码之前加上 - To combine a key with shift , precede the key code with
若要将一个键与shift组合,请在该键代码之前加上 - Enter the key code , and click
最后输入个人识别号码,然后按 - Windows forms identifies keyboard input as virtual - key codes that are represented by the bitwise
Windows窗体将键盘输入标识为由按位 - Virtual key code
虚拟按键码 - It's difficult to see key code in a sentence. 用key code造句挺难的
- Furthermore , the transition table and key code described by c + + are presented in this paper
并给出便于实现的状态图和关键c代码。 - Specifies one of virtual - key codes . for more information see key codes section
从有效的键代码中指定一个。从很多的信息中认出键代码域。 - However , you need to be assigned a wap password and wap trading key code on our boom anywhere
不过,阁下需要先在boom网站的boom流动服务_ - Crop circles are static pictures of key codes and fire letters emanating through photonic sources
麦田怪圈是透过光子源而散发的钥匙编码(即关键编码)和火焰字母。 - You can change your wap password and or wap trading key code on the boom anywhere application page
你可以在boom流动服务的wap登记页面更改你的wap密码及wap识别号码。 - Just go through the same process as you first assign wap password and wap trading key code and they would be changed accordingly
只需再次执行wap密码及wap识别号码程式,你的密码即可相应变更。 - If you are re - ordering locks to an existing system you have in place , make sure you know your key code so we can build more locks to the same code
如果再订购现有系统的电脑锁,请确保知道钥匙代码,以便我们可以为同一代码生产其他锁。 - To specify keys combined with any combination of the shift , ctrl , and alt keys , precede the key code with one or more of the following codes
若要指定与shift 、 ctrl和alt键的任意组合一起使用的键,请在这些键代码之前加上以下一段或多段代码。 - The paper mainly focus on these two aspects to solve the safety problems of the system , identity recognition and the formation , distribution and delivery of the key code
文中主要是从身份的识别和密钥生成、分配、传递体系,这两个方面分析和解决系统的安全问题。 - Clients are responsible for keeping their user id , login password and key code confidential . we encourage clients to change passwords periodically
所有boom客户的资料都是绝对保密,客户应对他们的客户名称、密码和个人识别号码妥善保存及保密,本公司亦鼓励客户定期更改密码。