英文log in表達的是什麼意思

英文log in看似簡單,但是它表達的是什麼意思呢?爲此本站小編爲大家帶來英文log in表達的中文意思。

英文log in表達的是什麼意思
  英文log in表達的意思

英 [lɔɡ in] 美 [lɔɡ ɪn]

1. 註冊:問: 有沒有辦法在SunOS4.1.x系統起動(boot)後, 自動地用某一個用戶ID註冊(log in),然後自動地啓動某一應用程序(如netscape)

1. 登錄,登入(計算機系統)

When someone logs in or logs on, or logs into a computer system, they start using the system, usually by typing their name or identity code and a password.

e.g. Customers pay to log on and gossip with other users...

顧客付費後登錄系統和其他用戶聊天。

e.g. They would log into their account and take a look at prices and decide what they'd like to do.

他們會登入自己的賬戶,查看價格後再決定怎麼做。

  英文log in的單語例句

1. Keep a log of emails that are threatening and abusive in case you need to stand up your claim.

2. The colleague who took her place in her absence noticed in Cai's chat log that Cai had been talking about purchasing office supplies.

3. Ji and his colleagues log long hours both in and out of the freezer every day.

4. To participate in the vote, log on to the Xicheng district government's website.

5. He has the responsibility to edit his postings before the millions of netizens log in.

6. Among the Lenovo computers'features is software that recognizes users'faces, allowing them to log in to their PC and various applications without passwords.

7. A rotating team of officials log in as " Chongqing procurator " to collect information and give feedback.

8. And the main commodities imported by China from Fiji are raw sugar in the past and saw log and some synthetics.

9. HANGZHOU - In addition to going directly to a police station, fugitive suspects can also log onto a police website and submit an application for surrender.

  英文log in的雙語例句

1. At first This paper formulates the necessity for depurating network information content, and introduces the history of information security and study point in information security. Also this paper analyses in detail the key technology of content filtering such as data frame capture, bridge, network protocol analysis and content analysis. And then this paper comes up with the solution for content filtering facing application layer which is based on the technology of protocol analysis and format conversion in combination with text filtering techonology of Multiple Patterns this paper amplifies on the design and the implement method of each module. Finally this paper introduces how the client of content filtering system manages the keywords and log and makes suggestion for the improvement of the system.

本文首先闡述了對網絡信息內容淨化的必要性,介紹了信息安全的發展過程以及當前信息安全方面的研究重點,詳細分析了內容過濾的關鍵技術,如數據幀捕獲、網橋、網絡協議分析和內容分析等方面的技術,然後提出了在Windows2000下實現基於協議分析技術,結合多模式匹配的文本過濾技術,面向應用層的內容過濾解決方案,並給出了內容過濾引擎的.詳細設計以及各個模塊的實現方法,最後介紹了內容過濾系統客戶端對有害信息關鍵詞和日誌的管理以及對本系統改進的一些建議。

2. Hey guys i'm bridget daly, here at the twilight premier in west way. this is madness(or magnets, i'm not sure). this people had been here since last night. it's crazy, before we get the scoop on the right card board, log on to hollyscoop. com, become an illustrator, and this could be use in the right hand of right card bin, let's go and get the scoop.

嘿,你們好,我是bridget daly,這裏是在西邊首要暮光之城的宣傳地,着真讓人發瘋了,這些粉絲們從昨天晚上開始在這等,真是太瘋狂了,在我們進去以前,登陸,成爲其中一個解說者,然後這個可以在右手邊的箱子裏使用,讓我們進去然後要到採訪吧!

3. On pre-stack seismic reservoir prediction is concerned, AVO application can be grouped into two parts: One is to study the gas-bearing reservoir in response to the unusual characteristics of the AVO based on log data on seismic reflection through the AVO forward modeling. And using it as the basis for guidance inversion AVO anomalies to explain the properties based on the pre-stack seismic data; Second, proceeding AVO inversion based on pre-stack seismic data, and Extracting AVO abnormal attribute parameters, bas...

就疊前地震儲層預測而言,AVO方法的應用可分作兩個部分:一是以測井資料爲基礎,基於地震反射原理通過AVO正演模擬來研究含氣儲層的AVO異常響應特徵,並以此爲依據指導對基於疊前地震資料反演AVO異常屬性的解釋;二是基於疊前地震資料進行AVO反演,提取AVO異常屬性參數,基於泊松比和流體因子特徵來預測儲層的分佈和含氣性狀況。

4. In order to simulate the real radar clutter environment, the use of zero-memory nonlinear transformation method of Rayleigh, log-normal distribution, K-distribution and the Weibull distribution where the clutter of different simulation and put forward A one-dimensional approach will be extended to a clutter sequence of two-dimensional sequence, a two-dimensional simulation of the peak to clutter Doppler frequency and space with the correct move frequency.

爲了模擬真實環境中的雷達雜波,使用零記憶非線性變換法對瑞利、對數正態分佈、K-分佈和韋布爾式中不同分佈的雜波進行了仿真,並且提出一種方法將一維雜波序列擴展到了二維序列,仿真出的二維雜波的峯值能夠隨着多普勒頻率和空間頻率正確移動。

5. A NEW BASE OF OPERATIONS: Revival Incidents; Going West in a Prairie Schooner, ... Following this he sat on a near-by log, without a stitch of clothing, until he...

一個新的業務基地:復甦事件;西進在一個草原schooner ,……以下這他坐在一個近由日誌,沒有一個縫衣,直到他。。