Examples of using The host computer in English and their translations into Korean
{-}
-
Colloquial
-
Ecclesiastic
-
Ecclesiastic
-
Programming
-
Computer
The Host Computer.
Run minicom setup as root from the host computer.
Enter the host computer name.
The host computer has an intuitive LabVIEW GUI.
Connect the device to the host computer with a USB cable.
The host computer Minecraft game should appear on the list.
Simple and direct connection to the host computer via USB interface.
Each operating system is allocated some of the resources of the host computer.
Subsequently, the host computer may control respective devices in the cell phone.
Download Imonitor and install Imonitor EAM on the host computer.
In the remote mode, the host computer must request the status to be sent.
Microsoft Office 2000 or above must be installed on the host computer.
ShareConnect starts, but does not connect to the host computer and does not prompt for credentials.
In a stand-alone mode the indexer can operate independent of the host computer.
The host computer or application can then understand the information and take any relevant next steps.
Users can move or share files between the host computer and Citrix Files.
Requirements: Windows 7/XP/Vista Microsoft Office 2000 or above must be installed on the host computer.
If the host computer is running Windows Vista or Windows 7, you cannot configure a program to start on connection.
Each antenna is connected to the RF output interface of the host computer one-to-one.
The host computer has an intuitive LabVIEW GUI that users can easily adapt by moving the components in the panel.
Now when you start up your virtual machine, it should get network access via the host computer.
After the host computer validates the credentials, ShareConnect gets a list of files and apps from the host computer.
These numbers indicate the domain, the subnetwork,the network and the host computer.
The host computer for Citrix Gateway connector for Exchange ActiveSync requires the following minimum available hard disk space.
Then, run the pull command to download the video from the device to the host computer.
Rootkit: Another type of malware, rootkits are designed to provide continued elevated-privilege access to the host computer.