Examples of using These commands in English and their translations into Chinese
{-}
-
Political
-
Ecclesiastic
-
Programming
Open a terminal and enter these commands:.
These commands do not invoke the execution of ARP in any way.
Open a"Terminal" and enter these commands:.
You can direct these commands to any disk, partition, or volume.
Below are the list of MySQL Date andTime functions as the name suggest these commands are use for manipulating date and time.
Running these commands in the Terminal will show whether the malware is present.
They knew that commands were coming in from Beijing, and that these commands were bringing factories from Shanghai;
These commands apply to the current document, open a new document, or close the application.
Without an actor to perform these commands,“walk”,“run”, and“jump” wouldn't make sense.
These commands are headquartered in Hawai'i and have forces stationed and deployed throughout the region.
Without an actor to perform these commands,“walk”,“run”, and“jump” wouldn't make sense.
All these commands are executed from/usr/src/linux, except for Step 5, which you can do anywhere.
The QEMU's virtual FDCuses a fixed buffer size for storing these commands and their associated data parameters.
These commands are some of the first that most of us learned and are used every day by possibly millions of people.
A working copy also contains some extra files, created and maintained by Subversion,to help it carry out these commands.
To use these commands you have to come in command mode then type:set followed by any of the following options-.
When participants asked the experimenter whether they should stop the shocks(which the majority did)they were told these commands:.
The consistency of these commands, from one Empress to another, has been taken to prove the sanctity of the Imperial line.
For more detail, use:$man command Files and Directories: These commands allow you to create directories and handle files.
These commands should appear either in a\clip tag(vectorial overload) or between\p and \p0, outside override blocks.
It may sometimes be necessary to disable these commands(with chmod) for normal users, for example in an environment with many novice users.
These commands are available under all flavors of Linux and can be useful to monitor and find the actual causes of performance problem.
When virtual machine guest operating systems issue SCSI commands to their virtual disks,the SCSI virtualization layer translates these commands to VMFS file operations.
Unless otherwise noted, these commands may be executed from a“Command Prompt” window in a modern Microsoft Windows environment.
These commands are designed to reset network settings to default, and in most cases using them will fix problems in Google Chrome.
When you start these commands, the command just typed will be shown on the bottom line, where you type the particular string to look for.
These commands can help us obtain a variety of valuable network data and save it in the output data file in STATA for further analysis.
It seems these commands are just sent automatically, probably to make sure the malicious script gets restarted if it happens to crash or be terminated.
These commands import the datasets module from sklearn, then use the load_digits() method from datasets to include the data in the workspace.
Note: Some of these command lines may be wrapped for readability.