Examples of using Protocol can in English and their translations into Chinese
{-}
-
Political
-
Ecclesiastic
-
Programming
Note: The protocol can be paused here.
When applied to systems in need of identity management,blockchain can operate in a level no other protocol can.
This protocol can be used to study APC functions and trafficking.
As of January 2016, the Ethereum protocol can process 25 transactions per second.
Each protocol can be categorized into one of the two categories: parallel or serial.
It is written in Python, but the protocol can be implemented in any language.
The protocol can, moreover, be utilised to set up virtual private networks, or VPNs.
Being message-based means that the protocol can support multiplexing on a single connection.
The protocol can be completed in one day, and the coverslips can be stored for at least 1 month.
Of course, high-speed serial interface and protocol can increase throughput and system performance.
The SMB protocol can be used on top of its TCP/IP protocol or other network protocols. .
Completing a greenhouse gas inventory using the protocol can guide urban policies to reflect the character of a city.
This protocol can tell us exactly that the data represents an image, and that it uses the PNG protocol. .
A secondary side effect of the update is that the protocol can be made much faster, resulting in a better web browsing experience.
The protocol can support monitoring of network-attached devices for any conditions that warrant administrative attention.
Some point-to-point tunnel brokers also support UDP encapsulation to traverse NATs(for instance,the AYIYA protocol can do this).
Bit oriented protocol can transfer data frames regardless of frame contents.
Although it is often used for modem communication,the XModem protocol can be used directly between other devices if they both follow the protocol. .
The protocol can be used for creating, modifying and terminating two-party(unicast) or multiparty(multicast) sessions.
All protocol messaging is performed using IP multicast datagrams,thus the protocol can operate over a variety of multiaccess LAN technologies supporting IP multicast.
A timestamp protocol can be used to determine which variables have to be transmitted.
A higher level protocol can layer on top of the SSL Protocol transparently.
The internet protocol can capitalize on the services of its supporting networks to provide various types and qualities of service.
In other words, the protocol can snatch up a ration of the security deposits that the misbehaving actors originally stored on the network.
Ipsec protocol can be configured to run in two modes: one is the tunnel(Tunnel) mode, one is transmitted(Transport) mode.
If implemented fully, the Protocol can be utilized to prevent trafficking in firearms regardless of the involvement of an organized criminal group.
PathLike protocol can be converted to a str or bytes file system path by calling the os. fspath() function; os. fsdecode() and os.
Although the blockchain protocol can be used to support market related activities, this does not mean that the blockchain protocol itself must be commercial.