网站首页  词典首页

请输入您要查询的英语单词:

 

单词 Configure
例句
1. How easy was it to configure the software?
2. Both offer myriad ways to configure automatic searches.
3. You can configure your newsreader to sort threads together to follow the progress of a discussion.
4. In the Mac, you configure the program via the Connection option under Settings.
5. Additionally, you could configure the product to be conservative or optimistic in its assessments.
6. To configure the first event group profile, select new.
7. You can configure line style, width , color.
8. C. Configure the new instance for Mixed Mode Authentication.
9. Support and configure phone system and printer systems.
10. Configure your software environment for maximum effectiveness.
11. Manually configure the VTP domain name on all devices.
12. Configure display format strings for date and time.
13. Configure an exception list to the blacklist service rules.
14. Maybe "./configure" will bomb out, or maybe "make" will.
15. How to configure network connections?
16. Select New Connection to configure a new data connection.
17. How to configure picture template by structure tag?
18. Failed to configure component'{ 0 }'as a process initializer.
19. You can configure the user agent via configuration settings.
20. Configure site - specific polling schedules for status updates.
21. A, Configure and prepare the application for Test Events.
21. is a online sentence dictionary, on which you can find excellent sentences for a large number of words.
22. Configure the appliance network settings.
23. You can comparison-shop and configure big-ticket purchases.
24. dial-up Networking is currently uninstalled. Press'Install'to install and configure.
25. Synchro, general. Right - click to configure.
26. Some installed alexipharmic ark, did not configure dishwasher again however.
27. I can only assume that manufacturers who don't properly configure the machines they sell are either lazy or careless.
28. Windows is stuffed full of things you have to configure or change before you can set up a printer, for example.
29. The partitions are used to combat memory fragmentation and to enable users to configure the size of target systems' memory pools.
30. This means that you can take any Akka application that runs only using local actors and configure it (from the outside) to be clustered, replicated, routed etc.
31. In order to configure gain and optical bandwidth appropriately, a concept of the gain bandwidth product is introduced.
32. If you set up separate CSX tasks, it is then possible to configure different active time periods in the CSX task definition panel.
33. Configure the settings within the Server Profile using the Server Profile editor.
34. With the new microdata module you can configure microdata output for basic field types and add microdata output to custom field types.
35. Bracket with text outside of it. Use right - click menu and control handle to configure text block.
36. To configure the VTP version on a Cisco IOS command-based switch, first enter VLAN database mode.
37. SD card reader and configure the USB interface, user can pass throw in audio line will be it with computers, music, play device to connect.
38. Part 2 will show you how to create governance policies and translatable messages, and how to configure access controls.
39. Further, IDA allows you to configure the number of data slices, such that a given data object could be carved into four slices with one tolerated failure or 20 slices with eight tolerated failures.
40. The following information will be used to configure the server components.
41. Through this transformation, IIPC enhanced competitive advantage for differentiation strategy in delivery cycle and configure to order.
42. Note: In previous versions of Mule, you had to set the remoteSync flag to true to configure synchronous processing in remote services.
43. Include and configure fabrication and assembly testpoint report output generators within a self-contained and versatile Output Job Configuration file.
44. In the next dialog, you can configure which memory spaces will be cacheable for instructions and data.
45. Instead of only configuring it to use one virtual Small Computer System Interface (SCSI) device, you need to configure it to use at least two.
46. Use right - click menu and control handle to configure text block.
47. Control performance factor was employed in adaptability function of genetic algorithm in order to realize to configure adjustable factors according to control expectation.
48. You cannot configure a leaf node as the master node because it does not have direct access to all the nodes other than its non-root server.
49. To configure the Universal Test Environment (UTE), install WebSphere Portal V5.1 with the Test environment installation option selected.
50. If you have a wireless network adapter and you want to choose your own network settings, clear the Automatically configure this adapter check box.
51. In this lab,(http:///configure.html) the students will configure a default route and use RIP to propagate this default information to other routers .
52. Most critically for ease of problem diagnosis, you can configure thresholds for each of the profile statistics.
53. A link control protocol ( LCP ) to establish, configure, and test the data - link connection.
54. Now that you have an artifact to deploy, create a Server Profile and configure it in the Server Profile editor.
55. Firstly, simply introduces the MAC sublayer and 802.16a physical layer. And then proposes design and configure strategy of the command post of field operations Area Networks based on 802.16a.
56. In the next section will go deeper into how session replication works and how to configure it.
57. They learn to install, configure, maintain, and upgrade stand-alone computer workstations or multi-station networks.
58. Border Gateway Protocol ( BGP ) speakers are difficult to correctly and rapidly configure.
59. With OLAPBrowser users can slice and dice through data, make graphical analysis, configure and print multiple reports with sub-second response times.
60. You'll also need to predefine hardware profiles for the VMs and configure them to use the virtual network.
61. Enables you to set up and configure a network adapter card and network protocol.
62. There are usually a very small amount of unallocated pages (which you configure) that the VMM uses to free up space and reassign the page frames to.
63. Install and configure Secure Socket Layer ( SSL ) on the server.
64. If you move the position update statement to a different package it is necessary to perform a configure.
65. This lab is to configure a default route and use RIP to propagate this default information to other routers .
66. Configure the hardware management of the nodes in the nodehm table, as shown in Listing 9.
67. To configure the pserver protocol, you must identify the administrator for this CVS repository.
68. The following command can be used to enter VLAN database mode and configure the VTP version number.
69. Go back to the Dashboard (by selecting the Hudson link) and select an existing Hudson Job, select Configure, click the Add build step button(), and select the Invoke Gant script option.
70. To configure Mail Fetcher on the newer account, click on Gmail's Settings link, then "Accounts" and then "Add another mail account."
71. Designed for digital content creators and users, the mobile workstation's digitizer helps them easily configure an image, either mapping it to the entire screen or to an area defined by the user.
72. You can ask for this to be done weekly, as an automated job, but you may also want to configure Snort to auto-mail you as well as admins when problems occur.
73. The major difference between the two involve different parameter passing, so you really need to configure both.
74. Which command will configure a default route on a router?
75. Even if you configure and enable automatic storage provisioning, it allows you to manually expand a space or extend a chunk.
76. To follow the whole thing, you'll also need another Linux box, to format and configure the flash card.
77. On a Solaris x86 box, you might also need to use fdisk to configure the disk partition before using format to configure the Sun partition table.
78. Dynamic messages - you can configure messages at run - time by use of XML.
79. As a powerful content delivery mechanism, portlet presentations provide a way to configure the state of the portlet within the same presentation page.
80. Although you can configure an event group profile with multiple distribution queue resources, this scenario creates only one.
81. For the IBM Cloud, it is necessary to configure all communication to take place using unicast transmission (the sending of messages to a single network destination identified by a unique address).
81. try its best to collect and build good sentences.
82. Thus the result can be used to assist security administrators to configure the network system. It may change the passive detection to the active protection for the defender.
83. The following sections describe how to get and install the C compiler and how to configure DB2 to use it.
84. If you havena ?t already done so, configure the primary network adapter (en0, in this case) to use the boot address.
85. Now that you've installed the C compiler, you need to configure DB2 to the compiler.
86. In Part 2 of this article series, you will learn how to create governance policies and translatable messages, and how to configure access controls.
87. What I thought looked great in the display case turns out to a nightmare to configure.
88. Configure the sort order, theme and theme settings in Site Admin. Also there is an option here to show links into keyword albums with item summary info (usually shown with thumbnails).
89. In the Hibernate mapping file, by Configure the lazy attribute to determine the search strategy.
90. With the LPEX editor base profiles, you can configure the editor to adopt the keyboard and command personalities of several popular editors, such as ISPF, XEDIT, VI, and Emacs.
91. The paper introduces technical configure, system functions and running situation, and puts forward several suggestions on further developing goods and materials procurement Ebusiness.
92. Configure event monitoring and enable warnings generated when database ACLs are changed.
93. In addition to forwarding DNS requests and the recursive nature, you can also configure more than one server to be 'authoritative' for a particular domain.
94. When configuring this page to represent the task processor as well as the landing page, configure the In-basket widget to not open a task in a separate window.
95. One of the main mistakes that people make when upgrading an app is to specify different and incompatible options on the "./configure" line or to uncomment different lines in a configuration Makefile.
96. You must configure at least one network adapter before the computer can be promoted.
97. Producing work is use labor tool and the social activity that configure factor of production.
98. To configure dynamic inside source address translation, perform the tasks in Figure.
99. If you plan to enable event monitoring of SCA components or handle events emitted by the Event Emitter primitive, you can perform post-installation tasks to configure the Common Event Infrastructure.
100. You need to install and configure DHCP and TFTP services on the boot server so that the boot image transfers to the eServer p5 server.
101. You can also configure fault analyzer to run on selected databases (see figure 8).
102. You can configure your message flows to emit events that carry transaction monitoring, auditing, or business payload.
103. How do I configure an external modem on an N4000 system?
104. You may also choose Open which doesn't limit outgoing traffic at all, or Closed which requires that you later explicitly configure what traffic is permitted.
105. You then build a final, shippable bitstream which gets burned onto your platform flash, or whatever method your design uses to configure the FPGA.
106. To do this, they instinctively configure the ADC to operate in transparent mode.
107. In our SSH Weblog server, we configure a password and username for an authorized user.
108. You can install an external C compiler and configure DB2 to use this compiler.
109. To configure Pacemaker, edit the live configuration using the crm configure edit command, which opens a text editor.
110. After you have installed the Lotus Sametime Unified Telephony API, you need to complete some configuration steps to configure security for the application.
111. You can now configure a private memory cache for every CPUVP to decrease the time of server memory allocation on large multiprocessor computers.
112. There were two very Tomcat-centric things we had to do: configure its connector and implement a Tomcat specific interface in the servlet.
113. You can configure the math library for radians or degrees (the default is radians).
114. The interlinking process happens automatically and what you need to do is configure it through the administration settings panel.
115. We have to make one last change: We need to configure our application to send certain URL requests to the new accounts module.
116. However(sentence dictionary), you still need to configure the primary key of the MEMBERSHIP table to use DB2's Identity value generation facility.
117. This screen saver has no options that you can configure.
118. Based on the business service modeling and service virtualization technology, business users can use VINCA to plan and configure their business process.
119. This tutorial shows you how to customize and configure your Emacs editing environment, from key bindings to the behavior of modes.
120. In the case of the UART, there's not a lot to configure apart from the baud rate and framing details.
121. It also allows users to configure it for monitoring of CPU temperature after the POST initialisation .
122. Enter configure jumbo-frame size 9216 -- Sets the maximum transmission unit (MTU) size.
123. It is vital for Talent flow in reason and in order to configure human resource and material resource optimally and to accelerate the development of productivity.
124. In this article youa ?ve learned how to configure a TXSeries region and local terminal to deploy and test a sample application.
125. For instance, the sizing and choice of how many buffer pools to configure in an installation would generally be considered a systems performance factor.
126. Select the Bind port to a specific address option to configure the service to be bound to a specific Internet address.
127. This article focuses on how to install and configure Red Hat Enterprise Linux 4 on IBM rack servers, especially those based on x86 chip architecture.
128. If you are using a firewall between the reverse proxy server and the content HTTP server, you can configure the firewall to allow only HTTP requests from the reverse proxy server.
129. The most reasonable configure can be achieved by determining different combinations of OPGW and diffluent wires through calculation.
130. To configure a route from an ISP router into a corporate network.
131. Or, if you have the wrong set of device drivers installed, running devfsadm might not configure that Fibre Channel adapter you're trying to set up.
132. PHPMyAdmin offers equivalent access to configure the MySQL database and view the entries from a menu-driven graphical interface.
133. If implementing VDI, configure the RD Session Host role service on the RD Connection Broker server to act as the VM redirector.
134. I have a preference for some of the RHEL GUI tools over YaST — in particular, the one we looked at in this article — to configure logical volumes.
135. Configure, then Activate it. There are no configuration options - configuration adds a minimal set of parameters to the root album, from whose Edit Item page they can be changed.
136. An error occurred attempting to configure the cluster service account rights.
137. In order to implement the optimized configure of the HRETS, the principle must be followed such as the structural optimization, the reasonable flowage, the right use and the improving benefit etc.
138. Drag to add a tree. You can configure the tree as coniferous or deciduous.
139. Part 1 of this series showed you how to configure Rational Functional Tester for these scripting functions.
140. The first step is to configure this feature using the advanced query statistics user interface menu.
141. Although there are more secure approaches, use the pserver protocol here because it is easy to use and easy to configure.
141. is a online sentence dictionary, on which you can find good sentences for a large number of words.
142. Note: The ./configure command can fail, especially if a prerequisite—a system library or critical system utility, say—cannot be found.
143. Configure the ECM Widgets In-basket widget to show the new in-basket widget by setting the application space name, as shown in Figure 9.
144. You can then use the return pointer to configure other aspects of the virtual file, such as the function to call when a read is performed on the file.
145. You must also configure other details for the transformation, such as CICS, MVS, and USS.
146. You would normally configure each ethernet card with a physical unit number.
147. The easiest way to properly configure the kernel for LXC is to use make menuconfig, then select Container support.
148. To run the standard analysis rule set, the development manager uses Build Forge to automate the steps to configure, schedule, and run software analysis.
149. Visit the flow management document in Resources to learn how to configure, secure, and use the monitor tools.
150. To add an additional IP alias to an ethernet card that's already configured, you configure an interface with the same physical unit number but qualify it with a logical unit number.
151. This interface provides a "HMC-like" GUI that allows an administrator to configure LPARs, virtual network, and virtual storage on the Blade and VIOS.
152. This overview has shown how to configure and use JCS.
153. Programmable logic device configuration data is loaded into the memory elements to configure the programmable core logic to perform a custom logic function.
154. You now need to configure Tomcat for an ActiveMQ connection factory and destination queue, also in a container-specific manner.
155. In an administrator role, you describe custom plug-ins to use, configure basic preferences, change the appearance, add custom templates, and add custom dictionaries.
156. Configure Your Server has encountered an error trying to install Terminal Server.
157. After a few minutes, he set to work, but then grew frustrated when he couldn't find the familiar pull-down menus to configure the connection.
158. If the 32-bit libraries are chosen, the user can then configure/start/stop the application/batch server domains and process scheduler.
159. The requisition of improving the air clearance accurancy in the large scale synchronous machine erection and changing configure method are presented.
160. The print setup function would offer up all those choices about paper and copies and fonts . It would also be very reasonable to be able to go directly from the configure dialog to printing.
161. Enter loancalculator. jsp in the URL field in the Configure URL dialog that pops up, leave the Label field empty, and click OK.
162. Yes, you can configure session management to run with in-memory sessions, which is actually the default.
163. Based on flow - control's discreteness, configure, affair and concurrency transacting , one application is organized perfectly . "
164. You can open the Makefile to examine it, but don't edit it, because any modifications you make will be listed if you run ./configure again.
165. Configure the NFA to the network interface card (configure an alias using ethernet card 0).
166. Before applying the new widget, you need to configure the in-basket widget and the content list widget.
167. Implement it using a centralized configuration singleton, which you can configure with a properties file.
168. EtherChannel - You can configure an EtherChannel group as a source port but not as a destination port.
169. Here you can find your newly installed printer, configure it or print a test page.
170. Configure the SAML module, as shown in Figure 9, by specifying The name of the organization issuing the assertions, such as myco.com.
171. This thesis explains Install and configure of terminal service through component installation, activation, configuration of user environment and software installation etc.
172. This article introduces local optical fiber cable making up of network, that the fiber network resources configure principle, that fiber network optimize principle.
173. IMS On Demand Service Oriented Architecture solutions help you quickly and easily configure your environment to address your needs.
174. If a channel is required for remote administration, configure it with SSL to filter the certificate DN and accept connections from administrative users only.
175. You want to configure your Windows 2000 Professional computer to support two monitors.
176. In this lab, students will configure the VTP protocol to establish server and client switches.
177. The DS command line interface (DSCLI) provides several commands to configure storage, such as adding host information, assigning disks, and the like.
178. The toolbar has to allow the user to configure the external system ( host name, credentials ).
179. Economic rent orientation and the selectivity of industry policy is not opposite. It is necessary to reasonably configure the selective industry policy and functional industry policy.
180. Files on the run time system can be accessed by the Java Compute node using the standard java.io classes that can also be used to configure the node.
181. This text file contains all the information GRUB uses to configure various boot options.
182. As a developer, you will recognize these steps as the normal procedure to configure, compile, and install most applications from source code.
183. The Telephony snap - in used to configure and manage the Telephony service.
184. The last thing we need to do in this add-on is to configure project logging and set up the log level to trace.
185. Once you have a figure in mind, you need to configure the swap space.
186. The amount of swap space that you configure on your machine is largely dependent on the application and operating system.
187. Thus the result could be used to assist security administrators to configure the network system. It might improve the passive detection to the active protection for the defender.
188. And by a machine configure file, the General postposition process is dealed with.
189. To construct a screensaver, the best way is to configure it with a virtual CD-ROM drive, keyboard, screen, and mouse, but without any virtual disks or network adapter.
190. MODE COM1 This allows you to configure a line printer connected to a parallel printer port.
191. To run an SCA business application, the first step an SCA runtime (such as Tuscany) takes is to load and configure the SCA composite file.
192. While at times I enjoy the ability to just edit text files, most administrators prefer the flexibility and ease of a menu-driven system to configure networking.
193. The major difference between aio and posixaio is that the two involve different parameter passing, so you really need to configure both.
194. This section describes how to configure IDS for the sample configuration.
195. Configure the provider in the list of your approved providers by editing the java.security file.
196. If we should show the CPU frequency scaling in the UI. Some people need to configure this for specific systems.
197. You can configure it once and forget about network sharing problems.
198. Methods Use the calibration module of system, configure the system with manikin made of aluminum or copper plate and arrange dynamic noise curve.
199. It is possible to configure the federated system to match the sorting order of sources like Oracle, which uses IDENTITY sort.
200. It also lets you configure your application's load balancer and auto scaling, which is the option that controls horizontal nodes.
201. Once this is complete, the usual ./configure, make, and make install sequence will build the standalone Ambulant reader.
202. Configure IP addresses, subnet masks, and gateway addresses on routers and hosts.
203. Site administrators can configure their sites to default to a specific document compatibility mode by defining a custom header for the site.
204. Do you want to configure this this additional domain controller as a global catalog?
205. Harris switches generally use command line mode to configure Database.
206. Use the Database Application Generator wizard to edit and configure the transformation parameters.
207. At least one IP address must be specified to configure the continuous replication host name.
208. On the Configure Image panel select Bronze 32 bit for server size and a system-generated IP address.
209. You can skip the setup wizard, and enter CLI mode to manually configure the switch.
210. You configure Balance to forward connection attempts on a specified port to a channel group.
211. The system administrator could configure and search the data in the way of web, moreover, create statistical report as we need.
212. At this point, you would run the application, then configure and bind the capture file as described earlier.
213. Alternatively, you can configure automatic index replication with the onmode -d idxauto command or the DR_IDXAUTO configuration parameter.
214. This article explains how to configure and use JCS to cache data for your Web applications.
215. To configure the security identity to invoke the methods in an EJB, we use the security-identity element in the bean definitions under enterprise-beans element in ejb-jar.xml.
216. The HTTP servlet in the sample provides a user interface (UI), shown in Figure 1, to configure the forwarded call address mapping.
217. You will have to enable a second Ethernet interface and configure PF to your needs.
218. The Virtual Machine Configuration Manager is installed in the virtual image used as a VM template; it will configure the VM automatically after system start.
219. The software includes pre-defined tests that conform to the individual technology standard, as well as a design verification environment where users can easily configure or modify these tests.
220. The pull-down menus of the two buttons allow a user to dynamically configure the content of the headers and, consequently, the table.
221. See Resources for a link to content that will help you configure Tomcat for failover and session replication.
222. This wizard helps you configure your computer to send and receive faxes.
223. Install, configure, and start a TFTP server to run out of /tftpboot/.
224. The Telephony snap - in is used to configure and manage the Telephony service.
225. They will understand how to develop software for systems with limited physical resources and how to configure hardware to get the most out of it.
226. You can configure the application/batch server domains and process scheduler.
227. Configure the pages and portlets that will be used for human task processing.
228. In order to configure SACOS, the configurability and the date structure of system configuration table was explored and a tool was designed for SACOS configuration.
229. He ran to the bathroom with a sketchpad, came out waving a sheet of paper, and said, I know how to configure the spaceship!
230. This visual programming tool makes it easier for the SoC user to configure their device as seen in this video.
231. Add, remove,(http://) and configure game controller hardware such as joysticks and gamepads.
232. Configure how data is generated for each column in the tables that you specify: You specify the type of data generator for each column.
233. Also, you must provide administration and application management functionality to monitor, configure, and manage the application and all the tenants.
234. If the application does not know the format of the data files, you can configure the adapter for flat files to run in pass-through mode, operating on unstructured data.
235. Configure the kernel to include TIPC, either statically or as a loadable module.
236. Since the master KDC and administration servers need the read-write copy of the principal database to make the required changes, you are going to configure the master KDC with the LDAP masters.
237. The active_scaffold method can be passed an optional configuration block used to configure that scaffold.
238. In the previous sections of this article, we outlined how to manually configure the use of local mail replicas for users in your environment.
239. The Disabling file locking section contains a discussion of the effect of disabling locking and how to configure this functionality when NFSv3 is used with automatically initiated peer recovery.
240. These concepts come in handy when you install, configure, or upgrade a local area network.
241. If you do use multifile WSDL, you must use the service definition to configure the node, allowing endpoint properties, such as URL, to be set.
242. The DBA will be able to configure the allocation amount when Informix automatically adds storage to a container, either in terms of a percent of the current space or as an absolute value in kilobytes.
243. The important part, for now, is a PCMCIA slot and a disk you can format and configure from another machine.
244. DDNS can be a great boon in reducing the administrative overhead for DNS administrators who otherwise would need to manually configure DNS resource records for these hosts.
245. Link-establishment phase-in this phase each PPP device sends LCP frames to configure and test the data link.
246. The code segment in Listing 8 shows what needs to be added to the Spring application context file to configure transactions on the service.
247. Performance Tester has the ability to collect from ITM monitoring agents, in real-time, without having to configure a resource location through a performance schedule.
248. If you want to install or configure software on the server , contact your network administrator.
249. Static electricity will damage the module. Please configure grounding device.
250. Similar output can be obtained using the automount utility, but it requires administrative overhead to configure the automount map files for the desired NFS mounts.
251. To add the swap space permanently to your system, you must configure one of the boot configuration files to enable the swap allocation automatically.
252. Basically, you can configure how often the session manager writes to the database or to the peer server's memory.
253. Again, read the man page for the application to learn what you configure in a dot file.
254. However, most packet - filters are stateless, understand only low - level protocols, and are difficult to configure and verify.
255. Formatter sinks use sink configuration properties to configure the channel at run time.
256. Configure the host adapter driver to be loaded through an initial RAM disk, which applies the configuration data for redundant disks when loading the adapter module at boot time.
257. For more information, see How to: Configure Client Application Services.
258. You will need to use this queue name later when you configure the MDB.
259. This contentTypeId corresponds to the Text Selection option for Other content under "What content do you want to use?" when wiring an action to configure a widget.
260. Beside the condition entry field, click the Configure user defined functions button ().
261. You'll learn how to set up and configure a Remote Authentication Dial-In User Service server (RADIUS) on a Linux system to perform authentication, authorization, and accounting (AAA) for users.sentencedict .com
262. The configure of TPS system, operation limits and overstep control system are addressed in detail.
263. Among other consequences, this means that standard Knoppix gives users no chance to configure exotic video or network settings before KDE comes up.
264. As we will be using the attached 4MM tape drive as a Tier 3 storage, we need to configure the drive on the OS level.
265. This snap - in helps you configure settings for the Fax Service.
266. New global settings allow the user to configure platform-wide behaviour, for example ensuring the device automatically switches from cellular to WLAN when a free WLAN network is available.
267. There are a number of ways to configure MQ in order to send messages to a device queue manager.
268. For IBM Cognos BI, this concept has to be transparent as you can only configure one server connection in Cognos Configuration. This is the case with Novell.
269. Configure the terminal or PC terminal emulation software for 9600 baud, 8 data bits, no parity, 1 stop bit, and no flow control.
270. You can configure your Custom Firmware like if you had the original recovery mode, once loaded you will see the options.
随便看

 

英语例句大全共收录104207条中英例句词条,基本覆盖所有常用英文单词的例句、长难句及中文翻译,是不可多得的英语学习材料。

 

Copyright © 2000-2024 Suppus.net All Rights Reserved
更新时间:2025/2/8 4:18:16